0) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:13 executing program 1: setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x9, 0x1, 0x5, 0xfffffff9, 0x5, 0x1ff, 0x1}, 0x1c) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000f008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000026c0)={'#! ', './file0', [{0x20, 'security.capability\x00'}, {0x20, 'security.capability\x00'}, {0x20, '^))K\x13.+#'}, {}, {0x20, 'security.capability\x00'}, {0x20, 'ext4\x00'}, {0x20, 'ext4\x00'}, {0x20, ')]*-*-\xcc'}], 0xa, "66228fb6eab7870f921f14b1738a3b5ca5236a0d64f37b57c9fc692ea37c73658bf019e546f41298e0f97a605ddafe3e618882be0edf9be4eb3b24a620ec480f35eaf249dc325fd40e3cdb0b3b0a984ee004ef313d6c5b72b090"}, 0xc2) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fallocate(r2, 0x10, 0x0, 0x7) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r1, 0x4018f50b, &(0x7f0000000040)={0x1, 0x6, 0x5}) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f00000000c0)={0x8001, {0x1b, 0x8001, 0x7, 0x3, 0x1000}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 279.294913][ T1074] loop5: detected capacity change from 0 to 4096 [ 279.300111][ T1076] loop1: detected capacity change from 0 to 4096 [ 279.309248][ T1073] loop3: detected capacity change from 0 to 4 [ 279.313358][ T1071] loop4: detected capacity change from 0 to 4096 [ 279.322935][ T1073] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 279.325304][ T1074] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 279.345654][ T1076] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 279.372698][ T1071] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 279.387677][ T1073] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x8010, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040), 0x8, 0x185880) openat(r1, &(0x7f00000000c0)='./bus\x00', 0x800, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000380)=ANY=[], 0xfd14) fallocate(r2, 0x100000003, 0x0, 0x28120001) fallocate(r2, 0x1, 0x0, 0x28120001) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x7, 0xc1, 0xff, 0x81, 0x0, 0x3, 0x20200, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x50005, 0x3, 0x1, 0x1, 0x0, 0x7ff, 0x101, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xb, r0, 0x2) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r3, 0x100000003, 0x0, 0x28120001) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000440)={0x5, 0x1, {0x400, @usage=0x1, 0x0, 0x1ff, 0xcc4b, 0x180000, 0x5, 0x2, 0x20, @usage=0xfffffffffffffff8, 0x4, 0x0, [0x7, 0x20, 0x401, 0x3, 0x5, 0x7ff]}, {0x0, @struct={0x2, 0x8}, 0x0, 0x0, 0x1, 0x3, 0x80000000, 0x34d, 0x4a1, @struct={0x2, 0x8}, 0x4, 0x77, [0x7, 0xfffffffffffffe00, 0x0, 0x5, 0x7fffffff, 0x6]}, {0x113ae810, @usage=0x100000001, 0x0, 0xf1, 0x5, 0x2, 0xf5, 0x7, 0x0, @struct={0x82, 0x3ff000}, 0x4f0, 0x7, [0x10001, 0x27d, 0xd323, 0x3, 0x1, 0xfffe000000]}, {0x6, 0xfffffffffffffffe, 0x1}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 279.423783][ T1073] loop3: detected capacity change from 0 to 4 [ 279.436248][ T1073] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 279.446771][ T1073] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x4fff, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200010008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 279.523385][ T1071] loop4: detected capacity change from 0 to 4096 [ 279.532273][ T1123] loop5: detected capacity change from 0 to 4096 05:03:13 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000000600)="00000000000000000000000082e36724c6f34caa846ed2e52770337801004081f619ac77441d609cf5b15fa5946623bf0426bc2bac4eeaa6083eb6fc71df80aa8af6152b4280def6e1f98c1b41783f795bba768a7aaec97b00ef7889d716025fe385ffe8", 0x64, 0x4e0}, {&(0x7f00000005c0)="03c27beeb2a3f4bdc7563bc248ed6800100000c106eb3a60337b7ecc3ff22629bae7074864", 0x25, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) r1 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r2 = fcntl$getown(r1, 0x9) perf_event_open(&(0x7f0000000680)={0x5, 0x80, 0x80, 0x81, 0x7f, 0x9f, 0x0, 0x1, 0x4, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x7, 0x7, @perf_bp={&(0x7f0000000080)}, 0x2122, 0x5, 0x2, 0x7, 0x1, 0x1, 0x3, 0x0, 0x3, 0x0, 0x6}, r2, 0xc, 0xffffffffffffffff, 0xb) r3 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r3, 0x0, 0xfd14) fallocate(r3, 0x1, 0x0, 0x28120001) unlinkat(r3, &(0x7f0000000040)='./file0\x00', 0x200) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fgetxattr(r4, &(0x7f0000000440)=@random={'system.', '-\x00'}, &(0x7f0000000480)=""/245, 0xf5) creat(&(0x7f0000000580)='./file0\x00', 0x9c) ioctl$INCFS_IOC_FILL_BLOCKS(r0, 0x80106720, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x6, 0xe0, &(0x7f00000002c0)="37329eba0daf4b139b5de70d16ba4eded3ec6633f6ce3b57949185d6989ed41c435c352126a6ac3e2f2c8c8594017d9da225393b8893312773560577d1d70a9e8ed448232ff6dc558bbea77866de9fb5d4af8c54cb96a76cb74cdc3f3aebb132d1a162ee09afe8e1b41ee28e88cfc2d81fcaff8ad78d8f470a2c1960ee628e0dd4dc0352cd191df42e618a2ec0d1c04146f279ced424fd9af037f3bbc4e7910d2db95953df0cd6423a2dd67e595210166d874bbcfb1b60d0c77978bc221728b6b8cf09ccf251c89c14474e44c05817da17457cb79f338bdf0b1e55d938309568", 0x1, 0x1}]}) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x100010, r5, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 279.623568][ T1123] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 279.628134][ T1151] loop4: detected capacity change from 0 to 4096 [ 279.642046][ T1149] loop3: detected capacity change from 0 to 4 05:03:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0xfffffffffffffed4, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f00000002c0)="02000000030000000400000019000f000300040000000000000000000f002e69581f83574f5be571aa03cfdc8a32944989689c4bc6cacbce8fa812fde4a929c34ecad2bef4ff6c2b4af7475ee33c88a4e6469ae42ea40388f7fd0c93b52f1ba8f8ec77b6979fa5931b4c308f5b94f3cb9b45f08939cb17d1b53a9ea9da7331d9d580", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[@ANYRES64, @ANYRESHEX, @ANYRESOCT]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) creat(0x0, 0x0) write$P9_RWSTAT(r0, &(0x7f0000000040)={0x7, 0x7f, 0x1}, 0x7) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x576c3000) [ 279.667987][ T1151] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 279.680465][ T1149] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 279.691209][ T1149] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 279.699187][ T1161] loop1: detected capacity change from 0 to 4096 [ 279.725770][ T1161] EXT4-fs (loop1): unsupported descriptor size 33088 [ 279.762844][ T1149] loop3: detected capacity change from 0 to 4 [ 279.785856][ T1149] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 279.809041][ T1161] loop1: detected capacity change from 0 to 4096 [ 279.812604][ T1149] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 279.818472][ T1161] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 279.900088][ T1189] loop5: detected capacity change from 0 to 32632 [ 279.910562][ T1189] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 280.024675][ T1189] loop5: detected capacity change from 0 to 32632 [ 280.031547][ T1189] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 05:03:14 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x1a000000, 0x0, 0x0, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:14 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r1, 0x1, 0x0, 0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r2, 0x1, 0x0, 0x28120001) sendfile(r2, r0, &(0x7f00000000c0)=0x3ff, 0x17e) unlinkat(r1, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x5000, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200011008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[@ANYRES16]) open(&(0x7f0000000080)='./bus\x00', 0x80000, 0x93) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 280.175289][ T1225] loop1: detected capacity change from 0 to 4096 [ 280.175614][ T1224] loop5: detected capacity change from 0 to 4096 [ 280.191039][ T1230] loop3: detected capacity change from 0 to 4 [ 280.191720][ T1229] loop4: detected capacity change from 0 to 4096 [ 280.204916][ T1224] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 280.210269][ T1230] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 280.213380][ T1225] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 280.232246][ T1230] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x200000, 0x7, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)='\x00', 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 280.279227][ T1229] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 05:03:14 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xd80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') r4 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write(r3, &(0x7f00000002c0)="62c33e553303348faf143abd72b63153c2e4d5e876bff53184a7eabf6df50d639f7b18a121766d5180ab3dc5272884c6dc93e9be6f4d5d091fbbc7a4c1698827c762faeb4243727863478a84013635fd959c2227b27e8280bfddbe5143793ce2527bd7618c2c5f32d377b753e23e684b6cdb87004e60a72f45a8765c7c0bd06f", 0x80) write$binfmt_elf64(r4, 0x0, 0xfd14) fallocate(r4, 0x1, 0x0, 0x2811fffd) unlinkat(r4, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000618000/0x2000)=nil, 0x2000, 0x1800003, 0x100c30, r5, 0x5000) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 280.342683][ T1230] loop3: detected capacity change from 0 to 4 [ 280.366656][ T1230] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 280.376719][ T1265] loop5: detected capacity change from 0 to 4096 [ 280.379322][ T1230] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 280.398091][ T1265] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 05:03:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200012008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 280.440706][ T1229] loop4: detected capacity change from 0 to 4096 [ 280.465482][ T1229] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 05:03:14 executing program 5: syz_mount_image$ext4(&(0x7f0000001940)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000001980)="2000000000020000008cd0493e0197811f7ae42432cc3db5b9000000900100000f000000000000000200000006790f771c0008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf44799f92e1295842f010000000000000001000000000000000b0000000004000008000000d2c200001203e8802cfd8e9e902d797a3e615cf4f29f0300000000000000c7d8f23f03ccfff84785e19466e56b4909bf60379a64f3264a1a3c7b591b446b485a538e1a089aba2ee5a22d0a26163538671e6cc9ecca599da6b9d04f9385c1346fd5c27c912b67f6032320f70f3501f85c584ed3ff", 0xea, 0x400}, {&(0x7f0000010100)="846ed2e5277033780100400000000000", 0x10, 0x4e0}, {&(0x7f0000000080)="474ab6c7629e88602b06a87f3b5e9f894fc1b86328410a9b040469e4b11e9b97457038509cdf51", 0x27, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000001a80)="ed41000000100000daf4655fdbf4655f7067defcd940367e6510c269dbfe80dbf4655f00000064f6d0546b7034867a9db4665253000000040080000000000008000500004e0af301000400000000000000000000000100000010", 0x5a, 0x4403}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x100001, &(0x7f0000000000)=ANY=[@ANYRES32]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000001840)={0x0, 0xffffffffffffffff, 0x5, 0x1b, 0x7ff, 0x3}) creat(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x0) setxattr$security_capability(&(0x7f00000000c0)='./bus\x00', &(0x7f00000001c0), &(0x7f0000000380)=@v2={0x2000000, [{0x60ae, 0x401}, {0x8, 0x8}]}, 0x14, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) rmdir(&(0x7f0000001880)='./file0\x00') open(&(0x7f0000001800)='./file0\x00', 0x3, 0x8) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pwritev2(r1, &(0x7f0000001780)=[{&(0x7f00000002c0)="abe2efa255547d7a4d2c289fd5fcaf2e31052413cb0c77595af95c709fdb41c037519a691b3bc42bf1d0763255ef909bfbd6e8640f6f04f4531e3d7709df4b9b3eea4dd0f511c51cd92c8cb4c54d5c8ba985817960e6c53cf9d1dbe3bcd97ac679e04e60c0e8104b6e9666494c78ef1a69070e50b91850eef1f99a095f6f37ad0f54e509e90df941f1f976bd9d3a035970777d364ab8b45a8c18b84d639fc1", 0x9f}, {&(0x7f0000000440)="6036e985105752df3aaed3824fed9652797aebf114028143ca51aee96619c9c1bc402c6344463b0cd30b31a702b9e8b7f4d9961d4dbe03a04d4df1ac619bd0c388308479754b1f94b13934e2d8eb630b185dbfffbf7b3344a25c6d27d434904e534c302f3deacbd826ebe33fefa8489189220254b8e74698089dc41db29606b99fdc84a010e21e8036428be2f49a6f975dd5eac7272e98a28b043e3dea8e0de92d04936de68a280259611d4b8ae7792d34b9b63c671d87f00556a8b69c7a33f5ebd1e2861f7c04036d9c8b423472510b0d9db77ca88571793c6eb68cccde909c6bf0438e25ab503a6bfe10965f5028a0", 0xf0}, {&(0x7f0000000040)="7608d654b7ce2a16b7f648aa1d0b449a346bd56762aae4500315c36ba38c6672", 0x20}, {&(0x7f0000000540)="14b90a17144ab64604fd0b000b5e4107e1fbb6ef3e59d67bb237f02d10fe83ae47dedc127d7ec260404fa01ff6ef757fbbe6e9a0087142be3d50c3bdb010344794eb00ad1755d723ade72000c32b668d3c5127570a8ecc1d723f4099010e638d247734d458b364a00dc1d095b2e4c31080ac68b523d37181bad0aaae602466ebfd0b16206d7eeeec40c8df2053eaefd54bcfc2cc7e4d9905b567388c2473bbfca7afd9666211eb35c968d08a0e34b6b549b090da5357e5cd7f5709b7dd59e07a7560740d78cc036b", 0xc8}, {&(0x7f0000000640)="28d87ca89955e8ab925e4627c8b479017a60478279c98eb274dd5b329e3b7571eae0e693e203e06c93777343a0ce2b966c2a5f7065a6424566becbca8ea4ba034d4f83ea3f5f7a02569004651f4d124ec4195c4c33007c04165f7507e6d09740d93a093f75a7bd9b7a4c80d732d8bd85ebd8aa49019773344d3fcacc59ae9d86ad43c1688626cf9ad43067426e7526620cf1d72ee7d006a3d64170a895df2f806dfc45549e99f783657b5a6d4c57029a66b200a2c7b1cdf95962846f424543012f28d56f867fae444b03456952f859269e201266231aee2b2ff352812a5309b468bc615d86d4ce9abca551b934c7538bd2dfc61cfd4d524e55f806eeec871f348d58ed3bfffaaca3ffef6d67730321c15ff000ab413be1ede9d049d534b1e27d94e846d2aa7b23f0cfc06843abcb702f272648031ad20837154a13ee7695b9fc78f349db746813dfd0a9f33e1b9ab157bbc9f7085cb89be9b9e25de3f5bcb80391523e079d6d6c7a14acbec63087c467614f42e0942c75e8b23243c9824fe3021f20447fb16442588550548e38fc3b04f84c14897c4030e7ae1ee6ad476c80276d6a32df10e387f6e12f17ec5acdcf5d916c80f39b7d760a00e43ebbae9cf821905528805ead9a6d01cba443ac920800b2405c1c0471805b5ca0db6817391859e9c9869fa374414635bdbf70f46a94a2b5761fef81fd08a2f2700af1c6f597e93db7a2d69ca9b60772296987a9bc31cd94b1bfd9390a10cc107ddd59a83ce242144adfd5f610fead6b37694e8a9ce96ea208a343795a558952e0ac9e0d149bfa3d5cddfe4dcb63e38a6d2fe16dce9e71d9d2d3c351d5dc21589dac5e030710d92f3772915e45632e48000925986fbd3363d9d5b8d12b20e05870df5c02a5f8af4848e224e37599095f2675e397ade64f2c7f90a926f4a9a817501be332f2ff88537b3654e8f7428778b38306fb5aba4540cab665e08ce89d555737febcf20ea8979aacf59a5918f05781bc71936b21e3fa3b9f2a18d2e1e7adcc98fdf24a18b64473a8e343d30c548bc3e349de3d9c244ac1f86e70aa171787a666555024eb029efbcabe8979806e1e4ddd5648c890fe9c3d5a69876aa31069f698acccecbe61f56a204558e74f5cd056e730510162816226b102efe43c2da0beb994a19451512a03652a1847f4112fa39ae065619f6ed90378da4c9f1ab8dc915b1b688d032cc9c70ed3befd78dc10c5041f6224c86fca30e2b3cd3f324dfe91d53ed77aed521baaab8034f51bf0a1c0b48a2872d420d5914cfdf7ecacae537314ec7851aa5f42765a051239d37a510a8f377ee349bb524a84930c84e1fc69d59679c2b45e4b987fd154d34c06fd4a141e6785815a70f8da7a40221041ca239a4a3ec1776e41033ebb508e5a2b6738025ad0fa2d4e110258fd252373bbbb7372712ab55e640a8f7da00852f7a1f9479f92c12220817c6e1fee663bff8381525d088bf240ea2154c4bdb81722d7a4db0e39453ed5ed70a1518625b7d943abfcabbfff6a6a5a4c4ae9c55477312a72eb602fadff363606c84af3e72720eae782399561d6fd4add257bda158403a78ce1461805d89a5a97de88a047decfca895aee1fac5c4467dcbaaa05d9c4cbec9e8468df60dbc0e88f5abfee25da897e6dd04d5ec29fc46c127cb38f99c95acf371b835482bb17c28432163aacdaef5b2b17fe69923e8ebd79f2c4dce2d870b329fc73fb2fe880e7c2256d37a37ff32c5f6e2971200c7e30a2b8dbff5eb5bb1aa0f0987de1eca8c69ac194e8e144370242b753e58cc2fab6a18d39ace61d66fb336ef7786d8570a4a4d446e280943a95f7507e9d4fb331c819161a1489bf53f0da020ece9bf71424e45cf3eed58bf9098471740c2c8f578b31e34934c9f8c32dcf6fe0f59d3c068fa50d435735ff8f48b21951b57fd2ea38d50192087c60a88f09345f90de2a67fce71a80e5627f271311837af2e5f296fb4f01ffcdf92f2d2b9adf411e71adbec5c9026bacf5be00f98d5c3dfd81f42c121393c0e9066dce9bae116b2dc4233e324615f48edc39e312abc8779fbd0fbe438b4b40eaf8aa52cb6bf11b1dcbb706fe87a9d578a9220abeb1bad2b2d2a9d5d3036cd1ee6c989be3ce1f22b49a93e19e063305d8f74a616a6e140485f532960709111b9afb1b18b2544c478a63700cb509ec12ccb96afe62640905703b21e3bc3c24a69ab6cd9b38df0c6ee523d00da1c1f4915a379a001e13744c4d90126556282318437c2fb6604186cb440659de698e8ae16f583db47ea142e00babfca1101e22ae4baa2ca0888f51ac12d89f5366a7f5f0f9437ce32ae1663ceb831f148850acd839fc8456ccef1fbdbf31badf079ca1882484d273d928469f4088db080a10b3c7bf2427e973e4ee8cebfcb82b33da5d86a7112757b61de8a6cc04c26e1b58c2f00913dfe06ff4f1e17c785769562113ec88c8c774db255a10c87a0f1ee2b831afaf3c750fa8421a9a328d9391652ec25bf6c8f51709b41b7de5535efff41ab9c39ea1511a9985f16987400df41a3a204bc874eb7643c952b5d9c8f22d86a8cec9f4a42a1d275fd8053459bb08a5e1aa5b4919aafafaa6087d8ff2a100b05a9cf3f010f3b4a10facf12e3938d90017bd0cf988b432f918946c5807011080f7c737c78cbe39e8ed98ba4d901ba045e465052fdfe4c197d90deffbc60a686d7dc2097ab9976dbd2cf034d8e39843f9e4439aaec4f58edb3d632ce94f894510eae6d6521c48004348083b3d7d8f6bae18530bfdbeb36f9b8c36a30bbde7f101356d660307b9b660ea7d7884f76bbe5636d8a752893af2f1f26ee4c66e0e53b95720e1e6b8f6f20fbb6779817638d5e7e523dea56d3c6e9c0580171b27baa6a5f8eeab61649791c51a204942089291460a0f489fd88564c562fd912696ff5080667b0a4372c7b6e235e5708190cef0b52f7e467217afe8cfe1318ad7dd2f8e0b12b398c8e1b48ec819c9bd1722d44006e36075ea3a725d23b61432e761cf40e31133570815a06787455f1fd0c813b61a6d0993f1328a219df1f209f66e73d7dd6a8affbcfc7b1ca1a348f312cbd4ab29610f1d4114b9b58132793dc5eb48ee6c1dfc8717de7b56cf6209a832432df2d49bcc552e90d1c6a2852813e73a1e9f8ad1c69fb52a5f3bffec38497cab114d98f62667a97febe398c62769fca30cf30e020f11a4d7df07e211b02d15804e15ef5ae04466b92ccf1a565ba8015d7f43e69bade303cc56af538b916b14d353ed80027e96bc88bb4dafaec1ed4d0477aee908fa195b7fb8f559b74379097eff5572945303d20be7a2dc3c45adea91afb1a9e7df2d82e826582ae97c64186b6f95bdce6daa60bdf9be43e397ae117622c85bc0a7ff173c540be3151f9b73f556ea7a035cfcccf38be430d9fb39e8c2f6995ee836fe381b50b18076f62663b17719b887c6d41966f675c3aa21d7e5b4cb8506c655ff2d34c95bc52d24a877fdc448062a2af610cc11746e64cf62af3353aee99bd293e2edc9b9b33a4076a402db6484efd6f67f9aebf7150ddc331086137ecb5a00a02041eca91088fbff4c94e705d8529dbdd59a65bb45463d997d9ec65f00d6313261aeba6f172392982691c82d5b3aa6aaa2b63cf13c8a2e9d29fbc45423ee68829e763e1c372d2645e4b9c2cde5c2b04da29672aae8c79b0ae818d1b8ac937639bcc8fef75d43b5c62323669696cdc6859abe56c35eaa01978bd311158dab79ce0ef74fbed8632cd9b7a30768d26a0846d79ca11a6ee0a646317246d651f50da06e93aa6d19154a7ccab7b3abc9dc2ea815e7031f93b201ce049340832b6b208eb6cef5be8f8c6739fab9f4d269663b3f3a9f91ec11d9600c09463da75a3a81330bb03398b9ce849f2ac3ea6d1bf32fc3c66c0f67aaa64336e518d9b8ce0fee92f2fab78d9a5d00efffe5323ddfda7842b4daf66ddb8ac6c1ea94835423d5dab49c51f0351e4eee70dcab919afacc2b5fc233755cf5403679d2443053fe22d95bd402f23cde75d4ab483a495d4b49551201895ad6e35e9623e9f0acd1cff4d35424829d54bc98f5b18b372ec1138dd8dcf2e898184db9ecb723a2664c3243b1c951f06eaa4ef016156bdec092170c423657c944fe6d99507ade2e52f171cc8464c59091fad2b25aafc431c7b86ba4f9e0ac563686aa5fc3350d79685c93a90ab0913c3f2e090f16193a7428fe519916804caf8c38a2273a78af1c814f921066527c8eab75013174d3015f31b8abb7364e2696956472b5076c62215d495651f167df161e90dda1cda7e85c31924094e308f9e9707a37bc34e6a4ca6a390434daa5767d36bb9b00323dbeafdd8a7e4ecbea81adc55e9aedb19ea430597a36cd600d4d8cec299636b6db7baea9b542d51958f5c0f90749bba9e4325cb814b84ce97553ee326b5fdf5ee2b7d1f685246cb2a9ee8a3ee29afa31734f51962e9744bf3a8bac58af3bdf511248ecd0c286d8ee537f8ee2ab347d8d3f103033e481808ee0ac96e67c2b94df3433a0fb37b3211927fa373b79c26dbc43c896ea744ce1ddb6a9aa4d94ca6025e7587410ff29592ea46fe7ff9dd90aa7a2ec4b89b5a9ca6824789b6d649cce01f21cb78553ba9b573dee1ea91955a877a645473682aeb958a5e1d104af7abc32d22315cd272684fa074ee236b242df70d23a29df5dfe602299d6eea800069ef52e9f989cd3a03f741445086a4895fc0d3b84fc5738c40081d69ab5457e2c1e8cdb618e9e746d6590267a5cf397d0da6c9bf3556678c431670c52ad4d94644aaaa8c9659a98ef308e9d504a5c0ef526a049773a25195afe214efadec05c31896a0d1ee0ec91fbc3a4826d01084eef72582457793fcee56034c25671cac1200829d67a5a8e7f2dd6939069076dc9dbc2b7c925e072cb2c87753ea9978cf712b81f477af658fe0125bed09f41c29a4db618498abfc14243da228095de914d8df01f1381addea1c1eb01bfeebd9adafeed49df206ea8f6203fff1dcd80197bcbb0573cd70d00a126a89904fb1757af0e3df13f4c8b7160d030358b438e113fc259f9aa46622730f714e16f4862274a274117a54b21e82ee30692f1a3f17d6b790acf0e9ab5b403effb4ea86d3019b734348aeffdbfd8f4c55fcd703d99ecd1399d8155f825e8a70ca83961f5c227845099304e72349f9ecdc9d6041b8606f80f27635ef955c5a36725e8a3fbc03d5a4ae2270e3d775b235e5cd1f20e592b9f84a64ed4d2002f81a3feb82a824f79147cc9ec5b33326f46cb164ce77e9c72cca939a46e9a1b659738de3163c9e87927f1432b6f991125f042c05f497cf8f1fe7a9ec961355a81481b312ea20e7789c6cb1b2f3044b4925f2250ccae55d439c66edd227c801ca65c173a66f95508fadce988f320d3c2814d82045e43ae49ab210f33254ab45c8b9abafed5a472422ceb4a6afce5f6d017d1fb5f39590ab6c7c3192834335cd074a3c93a4381104c0ad313f1b01556d03863bc47a02f7972df94746607ae04cae6fe78bf661c52734c2fb0a96fbb7fd783e7072f42104f9dc22e2346c8d0e70f073fde42de1b0c85ce9cf41c63e85b508d89a3e9fc8358413e6a78d6be889ddcebc989ef834c4e02f1fb7af142412a3978f4b30b0a0ad7d0e3dd5f2671b6c1cecb5e7759b49d32daab67f249821ca9bf34bf95592d2c428944aab05c51495086a221b4e743cc4b8546e171d3c320da742967a84ff38414d938aacef4f2a98bd233bf36b5e036b5c29e148826a7475df3e8d2e38c", 0x1000}, {&(0x7f0000001640)="e1000c9408cf6e162cc0827240d4fd8571e4f9d8277caf09759fce75dc7e6a820490badb6a7d7d93d571d9bdfd1e2716a491c5b0620854a204c695e2c957110129c8d6836b2e882257725f0b554b9c47d021edd265a65339752ab62fad4aa9aa64b20e89a954b61ea6087afce89e8b7277e8ea703beb13f1d03eeb467033810d8af147a6c42bfd9e10537c84f19169b4", 0x90}, {&(0x7f0000001700)="9e03c5bb4776d0b129565fc0e53bd32a99fc473a6712e0859ded6c00cdfe5534769075e4eb606c99284d5ed02339d3bb8f56a87b716e639ce47efc28ec7fe48e8cd76b8fc1aba9007e86d952267625cb87bfa796200af6cd65607976d38deeb573bb5025dcfa19ffd6839d5ed3278f474d2d94", 0x73}], 0x7, 0x8, 0x7fffffff, 0x1e) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 280.486499][ T1291] loop1: detected capacity change from 0 to 4096 [ 280.493242][ T1294] loop3: detected capacity change from 0 to 4 05:03:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x57ff, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f00000000c0)={r0, 0x1633ac58, 0x100000000, 0x9}) unlinkat(r1, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 280.547842][ T1294] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 280.560850][ T1304] loop5: detected capacity change from 0 to 4096 [ 280.568116][ T1291] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 280.582048][ T1294] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 280.632832][ T1294] loop3: detected capacity change from 0 to 4 [ 280.639099][ T1304] loop5: detected capacity change from 0 to 4096 [ 280.651498][ T1294] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 280.661867][ T1294] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 280.672377][ T1332] loop4: detected capacity change from 0 to 4096 [ 280.691820][ T1332] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 05:03:14 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x2e080000, 0x0, 0x0, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:14 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x5, &(0x7f0000000340)=[{&(0x7f00000027c0)="095aecc477654bba0267604c19a54f06b02dce309b24ad3b9c620816360d6b6b36bf21565d766328cc98ad2fead445067c3a39bb4ad5760e586e90997f776573b6a0df06e3ab417bcfe3d868ac815ace83f7", 0x52, 0x3f}, {&(0x7f0000000280)="406d6b18a2f0f70d46e234e5cd8d2c4d242f71ca3d0ff3ee95f9b4094848b79966fba544867357cd6801e693b152bad69b33a9712d2e3399f19ebdacd3ca23c03c6a0c153c202284646b498016b8c42f89764aba14c169e9c902ab9e3bf48c869f31b1fd6025724dabde3e3a88eb5201ca0b67ccc46d25b8b677f8c678e616052e1e59a6fe44e6", 0x87, 0x1}, {&(0x7f0000001640)="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", 0x1000, 0x9}, {&(0x7f0000002640)="9cd3417eb05dd0a12dbf90a9249d50f4d3e0d5e540a66690d33d0ea9c7381af009179f68668ffcd12f87a017816b51f75717d1e86e34403eea5bd9264eebd13f6e96b7d9543e6ad2da7eea8d0c83a09730b4fc3f3439e4b53bf87db8bdd637c23425b64fcb536c7986e519e544792f5f27cbfab0b21b6621823d334fd5722c9af9731bec0858cc289580949817a44970b8", 0x91, 0x4}, {&(0x7f0000002840)="0d5310c30f3383eae72c68139925c127ca027f363897754ac037d52fb1716ca333447e3477958bb0d99b90c1455ee57c16e026adf2e7b7c0756dc629b58265701ef4e2822b9f49c7693ee181d505deb7edb25c0ee81b682f297493459056bfd5009b91d3ed8119e41eb586f715a18d1045926ea62a1d3e8797dfe5464c5b48bc1d6804af4ba0735c9e9ea13484c2999845d37a48d9ca1809ac49", 0x9a, 0x3}], 0x0, &(0x7f0000000080)=ANY=[@ANYRES16, @ANYRESDEC=0x0]) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0, 0x8) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = creat(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r2, 0x100000003, 0x0, 0x28120001) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r1, 0x5000943f, &(0x7f0000000640)={{r2}, r3, 0x4, @unused=[0x4, 0x1, 0x1, 0x460d], @subvolid=0x7}) 05:03:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f00000002c0)={'sit0\x00', 0x0, 0x29, 0x1f, 0x4, 0x101, 0x22, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private1, 0x20, 0x80, 0x1, 0xf5c}}) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x6}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) unlinkat(r2, &(0x7f0000000340)='./file0\x00', 0x0) r3 = dup(r1) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f0000000380)=0x1) r4 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r4, 0x0, 0xfd14) fallocate(r4, 0x1, 0x0, 0x28120001) unlinkat(r4, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200022008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x5800, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x32) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYRESOCT, @ANYRES64=r1, @ANYRESOCT, @ANYBLOB="cb584566693b4a8ee137a0299601cae6d09ae1275933080b439f370898a93ce53eef262b79c71a3b7e7afa08000000bf55474b3f72db", @ANYRES64=r2, @ANYRES32=r0], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x28120001) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x6, 0x0, 0x3, 0x4, 0x0, 0x3, 0x86010, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xffffffff, 0x4, @perf_bp={&(0x7f00000000c0), 0x9}, 0x10402, 0x1000, 0x100, 0x5, 0x7, 0xfffffffe, 0x4, 0x0, 0x59, 0x0, 0xf57d}, r2, 0x5, r1, 0x1) pread64(r1, &(0x7f00000002c0)=""/66, 0x42, 0x4) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r1, 0x1, 0x0, 0x0) unlinkat(r1, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 281.051133][ T1370] loop4: detected capacity change from 0 to 4096 [ 281.070882][ T1375] loop3: detected capacity change from 0 to 4 [ 281.071019][ T1379] loop5: detected capacity change from 0 to 64 [ 281.082822][ T1375] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 281.084049][ T1370] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 281.104584][ T1382] loop1: detected capacity change from 0 to 4096 [ 281.117726][ T1382] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 281.121613][ T1379] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 05:03:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'local', '=relative', @val={0x2c}}}}]}) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) open(&(0x7f00000001c0)='./file0\x00', 0x420000, 0x4) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 281.142769][ T1375] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 281.174854][ T1394] loop1: detected capacity change from 0 to 4096 [ 281.182579][ T1394] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 281.210105][ T1379] loop5: detected capacity change from 0 to 64 05:03:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200025008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 281.228084][ T1379] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 281.260705][ T1412] loop3: detected capacity change from 0 to 4 05:03:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) fstat(r1, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r2) r3 = socket$nl_audit(0x10, 0x3, 0x9) fstat(r3, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r4) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f00000001c0)='./file0\x00', 0x200, 0x8, &(0x7f0000000800)=[{&(0x7f00000002c0)="7a7eb6b0b3158b05b621e9f93a636b6ab2c710e6b7d2a30fa4d8fcebabe22b5d3e5c1b9772b7a0affc586f2e0f080f4071241d931b58932051d4877e022108f08dbcaba170881256fd93a6bd4d40dfcf0c162328240fda60", 0x58}, {&(0x7f0000000440)="7fdc65fd9643e9f25f74a36e41012c8024cb537c7117c389ca803899e9058babc02dd4915c4d3f3d8d88e331410e2a2a44ad9bf743963b6ea78cf7097e2c258a04bc9eb53edf9fe1390a3f4ef8f3404ab36315f7a3c710bebf0010630fdc4ade201dc42b9bdca594dd344c03d4c8f89a77b8ac086c498191750d54bf729a5525819d72fba9a090a93a", 0x89, 0x7}, {&(0x7f0000000340)="a3fc84c58c04dbd293dedecd62d871fa1abe89235810b4ab8e92de694fdf49329b18f5205a3b21517c555498822743345375eb005b31c1e5473d009ff6f9fd9dde1513f434736754e9be4048f60f", 0x4e, 0x5b82f49f}, {&(0x7f0000000500)="1c6657cf0018ebbdc3e8e4669a9406a82ba5a341227cc8746bcf8b7a259fdf44f2f51f6d77eb9213785863e52b808d3d266af26222062eea9e0931e1cad8b2a57c8f3d5aba37aac43272b0079f71378f3519e401f02794fb1336fd02fb1910ff7429c3a060ae303a5beabac114462b039673b87003f2d7707d54843233860d0de35db3ec6d566408cac3a12ce887635ca54a20f4cd38ce78981b8309ff9fb480058b10fb3981932b23016ab62fb73abb15f85bce31c3bf55dee4e77e9434aa9a2c874a32174bcc22dcdec5f0e56bf61bae88d632d514", 0xd6, 0xffffffff}, {&(0x7f0000000600)="c0e0e9ddc6e6f4d2844e271a8abbe1a175fa9d6938633e6937982056bda2e18a46d97ad0f116d81dd30766daf889755c669480bed24db6c99ed34eee9a87838d410c960f5609326380460fdf3052228b8a261d535dca928205ca1907603d9aaf9d4536aa64873f9a4942312a83b55257b4c7847fcb1665d91b", 0x79, 0x88d}, {&(0x7f0000000680)="e9f0171450b80aee97d878a7cf2233e225306ee92e", 0x15, 0x1000}, {&(0x7f00000006c0)="a604b5b99d8316a3c3fac69bf6bc518e457c46b877181791dc5c1fee6b2614ec3fd78b2f1ff87d7c138f5f1a446e4741780f093c20c48550c9d83f495611f145fb64f04e0f7c76226bd587af8f53f4abaa9097277cf66ce9e60779a19579492b68b15d9e2b708c5b93c993f99b45e587159f5b771c0b756ff64ad1ba1b651c7bd02568ed7bb1e265bc5ead5a9974756824a7dda86211f3db5d2bbeebac3504", 0x9f, 0x9}, {&(0x7f0000000780)="51e193f3a929bbd900e395a518369a3d85d86b476b10f13869c88bc5134c5a67719819bf4d7ac791846ddd8e2cbaa0eb82313993e5f580f328731b1e5480e301229d0430ac6441a1ef5a2a73560b6de089bc889668bd7858ebc118534f9c1c00fca666023ead7e3743cc099967d7c0cb6eb4acf5db9173a861cd1e83d600f022", 0x80, 0x9}], 0x1002000, &(0x7f00000008c0)={[{@shortname_mixed}, {@shortname_win95}, {@shortname_win95}, {@shortname_win95}, {@nonumtail}, {@shortname_mixed}, {@utf8no}, {@nonumtail}, {@nonumtail}, {@rodir}], [{@obj_user={'obj_user', 0x3d, 'security.capability\x00'}}, {@euid_lt={'euid<', r2}}, {@fowner_gt={'fowner>', r4}}, {@subj_user}, {@dont_measure}]}) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) creat(0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f00000001c0), 0x2, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000002c0)={'#! ', './file0/file0', [{0x20, 'security.capability\x00'}, {}, {0x20, 'ext4\x00'}, {0x20, 'security.capability\x00'}, {0x20, 'security.capability\x00'}, {0x20, 'ext4\x00'}], 0xa, "4e3765290994bbcf345e5af3af648e1aa87a97dc682f1ea1f4ab7ce08697ff192653dcdc4b50ba41f298ad8b6ff1bbc33e0ad8d8d7efbab3904d975f1c69f37b5a4f22757016dc8349ba06acbe5e4c3cf7351603ac84a5e25ff12c1d9ceefcf14f4225df141c2c17dbb7a434a148ff47df9d7029fea58ce676d4cc1f2f3a37b21aec128478778290e2138f7b72f257109f59f46096552dc7c11e775a93e60e"}, 0xfc) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200028008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 281.276797][ T1412] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 281.286801][ T1412] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 281.296224][ T1418] loop4: detected capacity change from 0 to 4096 [ 281.364879][ T1431] loop1: detected capacity change from 0 to 4096 [ 281.366147][ T1418] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 281.384727][ T1436] loop3: detected capacity change from 0 to 4 [ 281.391529][ T1440] tmpfs: Bad value for 'mpol' [ 281.401862][ T1432] loop5: detected capacity change from 0 to 4096 05:03:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x5fff, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 281.406756][ T1431] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 281.435379][ T1436] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 281.444937][ T1432] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 281.457274][ T1436] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 281.537195][ T1436] loop3: detected capacity change from 0 to 4 [ 281.561499][ T1436] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 281.578280][ T1436] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:15 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x34000000, 0x0, 0x0, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:15 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r0, 0x8, 0x6bff, 0x0) unlinkat(r1, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0xfd14) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/60, 0x3c}, {&(0x7f00000002c0)=""/80, 0x50}], 0x2, 0x40, 0x0) fallocate(r0, 0x1, 0x0, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340), 0x480200, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000380)={0x0, 'veth1_macvtap\x00', 0x3}, 0x18) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x0) r0 = open(&(0x7f0000000040)='./bus\x00', 0x20000, 0x1) accept4$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000001c0)=0x1c, 0x80000) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x6000, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20002e008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:15 executing program 4: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) r1 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r2, 0x1, 0x0, 0x0) getsockopt$inet_mreqsrc(r2, 0x0, 0x25, &(0x7f00000001c0)={@empty, @loopback, @initdev}, &(0x7f0000000440)=0xc) unlinkat(r2, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x5) tkill(r3, 0x34) ptrace$cont(0x18, r3, 0x0, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000480)={0x0, r1, 0x2, 0x4, 0x2, 0x9}) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x9, 0x1, 0x2, 0x81, 0x0, 0x0, 0x40008, 0xe, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x80000001, 0x1}, 0x40070, 0x0, 0x7fff, 0x9, 0xffff, 0x40, 0x9, 0x0, 0xfffff800, 0x0, 0x4}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 281.941789][ T1494] loop1: detected capacity change from 0 to 4096 [ 281.955505][ T1495] loop3: detected capacity change from 0 to 4 [ 281.967322][ T1495] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 281.977007][ T1495] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:15 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x41020000, 0x0, 0x0, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) [ 281.986973][ T1504] loop5: detected capacity change from 0 to 4096 [ 282.004234][ T1494] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 282.032104][ T1495] loop3: detected capacity change from 0 to 4 05:03:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200048008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:16 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x5d010000, 0x0, 0x0, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) [ 282.040501][ T1495] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 282.051027][ T1495] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x800, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x25) [ 282.113043][ T1504] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 05:03:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r1, 0x0, 0xfd14) fallocate(r1, 0x1, 0x0, 0x28120001) unlinkat(r1, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x5, 0x5, 0x80, 0x91, 0x0, 0x7, 0x3000, 0xd, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x24, 0x0, @perf_config_ext={0x4, 0x8}, 0x8000, 0x10000000, 0x9, 0x0, 0x101, 0xfff, 0x6603, 0x0, 0x8001, 0x0, 0x6}, 0x0, 0xe, r0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x67ff, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 282.179073][ T1556] loop3: detected capacity change from 0 to 4 [ 282.197098][ T1556] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 282.208312][ T1556] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) ioctl$FITRIM(r1, 0xc0185879, &(0x7f00000000c0)={0x8000, 0x0, 0x7fffffff}) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r2 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x2, 0x8, 0x7f, 0x3, 0x0, 0x10001, 0x318, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x10000, 0x1, @perf_bp={&(0x7f0000000040)}, 0x400, 0x13a, 0x4403, 0x1, 0xf46, 0x7, 0x900, 0x0, 0xfffffffb, 0x0, 0x7fff}, r2, 0xc, r0, 0x0) creat(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r1, 0x100000003, 0x0, 0x28120001) getpeername$unix(r1, &(0x7f00000002c0)=@abs, &(0x7f00000000c0)=0x6e) [ 282.260582][ T1556] loop3: detected capacity change from 0 to 4 [ 282.269406][ T1577] loop1: detected capacity change from 0 to 4096 [ 282.286241][ T1556] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 282.312061][ T1577] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 282.318648][ T1556] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 282.341654][ T1592] loop5: detected capacity change from 0 to 4096 05:03:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20004c008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 282.362993][ T1592] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 05:03:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r1, 0x8983, &(0x7f00000000c0)={0x8, 'ip6gre0\x00', {'ip6erspan0\x00'}, 0x4}) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) mmap(&(0x7f0000480000/0x3000)=nil, 0x3000, 0x1000004, 0x4000010, 0xffffffffffffffff, 0x31448000) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) stat(&(0x7f0000000040)='./bus\x00', &(0x7f00000002c0)) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) creat(&(0x7f00000004c0)='./file0\x00', 0x40) fallocate(r0, 0x1, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f00000000c0), 0xe00, 0x200000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000440)={&(0x7f0000000300)={0x98, r2, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_DEST={0x28, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e21}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@empty}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}, @IPVS_CMD_ATTR_DEST={0x28, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e24}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}]}, 0x98}, 0x1, 0x0, 0x0, 0x4000}, 0x8008) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 282.453802][ T1619] loop3: detected capacity change from 0 to 4 [ 282.464184][ T1619] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 282.474807][ T1619] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 282.504799][ T1619] loop3: detected capacity change from 0 to 4 [ 282.515711][ T1619] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 282.536801][ T1619] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 282.546334][ T1638] loop1: detected capacity change from 0 to 4096 05:03:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200060008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 282.548109][ T1644] loop5: detected capacity change from 0 to 4096 05:03:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x6800, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 282.598299][ T1638] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 282.638332][ T1644] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 282.655853][ T1673] loop3: detected capacity change from 0 to 4 [ 282.681915][ T1673] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 282.698673][ T1673] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 282.736966][ T1673] loop3: detected capacity change from 0 to 4 [ 282.743542][ T1673] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 282.753266][ T1673] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:16 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0xe8030000, 0x0, 0x0, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x1, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x4300}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f00000002c0)="8081000000180000daf4655fdaf41d3f14a820fb5184f364655fdef4655f00000000000001008000000010000800000000000af301000400000000000000000000040200000030", 0x47, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) pwritev(r1, &(0x7f0000002700)=[{&(0x7f0000000500)="a9346f4f3513dd0fc880ca11c060454ba5bb121ea4fcc99a6744080aa68eaff5b219ab13e44da837fd0b8a06357d815b7bf0e2a88225a05300c9a07cea5394b8d609764be00222a1327271031ecb0d8e11bce2502fe42a917edb53ebe9e0af3b0c47ef047fb93a552322485715af4bc2fa7edeaed7fee36ee9a4ab0ef0867870905d7bd5befedc779632508a7fc54c7422b0fa231af65e14012d8c32f367f81394f3e7b7fa4261962e2624cd8f2d64d43040afbea798dd535165246cd504ee30c6d3f690c76c", 0xc6}, {&(0x7f0000000340)="fd9e39dbc17ffc6745c1f550b372b95b57c3a8c05dfdc057a6ef82359b712d4c1b999a6f1a01fe71550b38d4d78c03d43ea0831d9c5153608125537f7199aa349109be9daa5400046985a453243c93931067cb3fa1fecccdd54095b4df355f4bc6143edd388eb6f2fd78c07907be120f0400", 0x72}, {0xfffffffffffffffe}, {&(0x7f0000000600)="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", 0x1000}, {&(0x7f0000001600)="a5419f2505c4fbb18f03d3c181f0ea0ac1ea5ac2c5ab12280ec646400bb1b3f8daed1320d95dcfd26582720bb8d88c5d2d25ce0f21dbcd8eab8e456fac4139dc4f5bf031ad1f0663ad1cbf0fdabb0dad889b45e8d76521a8485add8255dc7db9223d63ee637b098b5af091fe2bb845f3d12c6064799334ae643574fcbb333b18be47571cbcf579c88ca0f6a3d1589f9a05a269b3431fdb6a2125042bae35b7158fe49ac0a896d29550589f108329a2ece232be3765377f0544df49eb3499f207f93d61a2984811d5fa7edc19ab", 0xcd}, {&(0x7f0000001700)="a8c3191505dcfdf6afd514dd456344187a9dde54723c07e48a5aa9abe41a389a369d8a43fd29d1afe6c4375bb558888d727329415f9feec44ee1ac17085631ed4c69a25a4834ceb46ad828d34619b74143bd1cc655343024a4f78d543415e2e0914ca3863f0e1ed9d80de7af2fbb272759a13773f02a70b8926f5eed7d78e06f3db4f975d8cfe38774ba615368ec0898388efb057fc0293d4d61ab19a4c68f61ed6a70b750f9fc9dfaa07688324362b1cf28fcc2a739504a2728a8e6ffb8add59aaf0526268c5ac86e49597a4f43b5307d00e24b2c0e32e5947134145d88936a01ea6a69dae5c073e48f92c628278d6a27064abcac2352f4ee0fbd5a8992a00d0fdaf0936f871bb8a7fc7ab8bdba31587b6f670ef4a39194ba0235118999c2fa13dad8bd767832e87e0d042293c0b4b49f652bc90b9c7530a1d48c56b2eea66cd0ef95eb2def3f479dd39f8c6ac0142353edb1c21419ce8a6eb939a696ee935da498eb42ba9cfbf47481066b06a5b1d283a5180eeda2947fc43646da2d86b01de32002cdfb5d166395d4e42b6dfc4586b0ddd9ff39d381728b477be34352f6ca839351c1b191e9380493a2b7ca58bf694f008b4a1520cc621f6cab2e61bea08fd69d371e9d75c8fcd86d9854283995fc308be0b3452cef08e42d5833355df13ecbc3e9b9b04db77a3f72f38af1db41b6a764d9cde5e4701b64768dbd7e6d1a5e97886ac44fe1d1b72a630c798dc5ab5f5566f7ac89e94fa7599ea04c105d5536fbe423ab2dcf0eb2b9bf2ee44741af51dfae9a8054480e82401e1e874c35ac96e75d9c91018aa2b90febbfc1f0a4f59faa31922d343ec53ac579ec4a4cf66ebde76c03b79e12107d5f83977e09db070efb82ec5e7ec280864f1d2dea863e40e86f0de81637bf517b43fb91fc32b61323900c61616ce921644542ecec819ee992ef523722330887eb4bb41bc1fcfb943a879f59a6f5e2b68e2f91e8d6ccac3850b6f287ca5834f9a46f061bdbea89e6f9300e1128490e2d5a6b375a15cd09a8d3b12a01b88229b464c24681c01f3ef52accc7c9687ada8b04dceb8b9851803c2f21181c29c7e2816abbdafebf00e11fe986944b12fe9f2bf9dfd24a0b323a9a460f5a8d1d38e3b1bdf1b219ef8fc58dd336dd304fb95fb5a323eed48c6cdbabb03c4918756515bcf311d2e446aed9a0d49d321949b4537f90c8cd45495491b204799ac401b450f76d373f31aa057d4eea2d4e7af75a2fa6ca8095942017ccd51ae8d44063d6b1aafe93533fc0ab3af3df4e9ad7f4b3aceff350d05244ead922e31326f88f51ac31be38e4ce57ac96c23d80a1154c3b0293f6a5845ab2b0905939d272e21442f1d62a1036fdee7c7e7fbbf6cf00756dedb3bddab6e049619aa6c91a33db0c855f71c22f5063c711128f58b08b293a8c049b3fac3e2ac513160979bd1e887afa63128f987ea255f010ea8b30ac6232499344a0d76709607da171f687beb2e987c79b046677277244c837cbd1ef0dd34928ec95eb4ae64f4c810359962096e19d70daf4151778c568ae9252151517fe59d63020699f9063b4c937375d07f7692a860ba9f4d446d20efff1086b70464dea04f8500cd78c41085bb449ce50f9a8c769e15f8aaf79dc61c61eb4c9835595abe533eb1cb2da8cf657d1da3deb2bd97e5566ffde109142e9e078cc15a5532dcd17e7f737252f1a4d1b54a9aa8358b45f4b80f2793c02648db89f55bcbfd161d7c27725483d21832cbd67eec9dee53834be68f7b96cb213ff75be37d67b9448f6a6c4b6051c3ce466fba47eabe8ad5c4313efe6f3c70027c0a850901917c47e5cb1f1422081556f022861a17eb777bb664337b4a7f242f3e9649aa20498e6fbf7b421073cc18df47bed9be8f5d2a890fcfe8caedc6c0a068e42abd0205f8910bc2875b6dfa1afc946a4ddb36a323fdee0db40ecfb685f9144d3b2becba81af5095680eb7b3ee0780da9460062f88e7e319cc2e90326c71b07952eea27ffa0b2087c0c054d5e3ce6b70c775bfde1f8bbaa67d845bd01f88965962c6e0c5734e02dfde62fcc2359e6d39ce5f266daa7087dc4841f3769cf34989c0581f7257ab3e3051600880e5c1a3162d38829fd22a81282c10b7988fdccbd209db589a0d299e423b2b9c80bb19dec2159d15dce0ae6f52765fc9bd373e97b28382420c035e95fd609956a4e79b1b719e12303fb2c076f33dc01791e6fd1ee81e457707f2ce4a81a01126a873ba48e902db5d5e0a46c5a687751589f899e070b454c731e0d3495973d39ec06311e1c97bb69eea9da8374cfb70e3482f6a0d931300d60cd648971247c175404c8dd32b5c9397c7e91a1bda55ae762a3b02540447417f070ccd8a61d31ad33ea75149d0aefc40bbde13d22e271211cc623a494495f8c7014df5191db8841e44e64ac529dce897603c05f6738a7da0312f668e5c5a45063ad28920c761591f6c3aad7904ce6d4d2f1cd411cc565a0b002eabee04f169c0b7e92ce8d456ddebd5414f3248ffadaa0b57951ee4b2290c95a4e9b7d65ee6e76b1fcd8fddd1e9d22caedc104d0d1e2a778749435dfc983d16cb30669576e9de3d45d03cae758243f9aa19c8e5570ad3656b760a31112ba7f1d9a3b194cc703316a299b131e1f7d6d9583ef9aab89f134217b5048857d3100ed2df2c66d27d480b32736356511d88f89f2f9c83ad2afc4d788cacca9d9230a97f7b241cd58ced263798856dead96a8f0972c12db2d69ea9801c8d633cc0e1a3ef0035649db0f2494ce9d66989851c3cc8f6a4971fdcabeb0f2c02dd2c884aa43dfa980045b9a3190f9c9b5e7232318e48a03112cc50749f12c592ecf5f18b7bedfb26dbe370dd372a3d5be28cbb3ffece8a1ca58aa147e033a3d36658b2be0b6dd7a8a51fd0631d595a64fd47aefb423402237625755481db97a9d82fc5506f1ff855e0952c908222b589a4bdf51912e87e4693cdf989a067c6f858bf2d2ad3c675fbc2c0bf94d08ef9c8455cadac630ba865c721d25d23b501fc2781bbb50e07eff17d2d0aab2690ada27521ae8807a9ee50ca8912bd0acba976911678bf6fe5be07aac92422ef1bc30e5cebc43aa463b86426e822daf77cfd4f1ce2f0535328f9f375827a087f8cd965f146cb9144c5c0d9a12b2c9b8fe17426c1ea6cdd3b96c699b7a7f5d97223964e4a9ea1c887220115f493ed819c332b66f10ce86c6c909ca488543b57715cad377607c92032cd27cbc5c8342cbb4b0c6b82f4ae87922917deb29e41b285e55cb19bea76f7944622f1759da7409f235fddef6af7e01aa8b26e7dbb3bb0271b0c6f0b214f318b1c98fd144dd24bad564471effec90547cec68337fd9eb162dd40ab5f36ab026c2308ceeb706abafc75adde7a7e5933415cc37eb4be194d6ce144efce1153d853ea282d0e9b5782226fe40b9f0d6ec553381073c7b4574002db0847ec236a625989bea35eb5ac898e5526042f7883b61458155d20a72b397d812e2f3114b9c9ab921294bc1495cc20349161bdd456da6423e237bc2e7327ce0344da87ef73557c5b235a46d2943351fed060dbdccf4b4802561deb718113b924b88951ca776765ef51ca676ee2e4e79dda006446e97d0f33029c5976ca7d69951165e50800db4098cdaeee8f4a2cb1b1e839ee14251b358eee23473f40c0503bcebe4021ac7628bae9d52ace2fcad2fcade954fcbcbb1f763374d0952b1975eab2270e9b3eb7c3c1eb7c0de9357ee516b0a70401f4a66033cbbddecbd3881456daab261969ab67437039a43a02ab19049b1d1f8371c2f85c3018c22b2be9b4d7f988c9942681adc18ea441c13e07b7d9d36107194e4e38df7581640e5a7d18881d6b50cd24f6c1bccdec8f02f44efe7f7d55b0ecc9b7d19b939fc1b6bfcc6ccde706836c5c6e844274bcb0ceeb7df37779e5f1009ee34b2a52de236b05735f250d3d4c901773bf00668d060e4c7880b663d57c421dda905fd2d74ce1676271b0f3db473fd83e32d01cb3c776125a6eedcbe34041e53c7217228546e468bc50580032c88fecbc4d3694d2c734c0dcf37b92bfbb288e0906c56f72296625a127702423e12e2cef884742093d04b1e6548246351bad22c0e0eb909e1a4f9bcb6441c84c917b0988fc9335415b860c72bb6424ca061df9844429a1edf4effa39b61573963e5eb50cdf81495456a476c93ff959e97782996e407444c6a1d072a0d4f87522a7b21baa61419e60f1dec946f2b66687e9ba007643853b82aa98406130336f3b6704c52da209b8922b2948e22c40d97613e221afa694c64c61181eee590bbf66096b72e86cf9cdb183cfe493d875293ca5d0563bdbd45d97242147c9f9bed594ea261bc97ca2f48efbe2ad97a70322b1bfae0a4c522517c8e23aade05db3b843c2b3a75197a5616967eb27babb30b8dc1f97db24ce9354805458488a01bc04e47a329ff3f8688fc6d11c4b0d4f0170986adaab3c229ae39b8007821b7b75e83b4d1c887359be8a8f2d547c5d8d4c7ba650c6963f17dac67c70ac465cae7a1264fba294224f3dfedcbc24bacd26640ed892eb19d483030629e981bdfca3f2105884a64a6d302be042afe75f67b795af79349c588bee2d0f6d2cc566ed9ddd518ca1535577c9c3ceefccbd336965cb407ecee8c7cd79d2128acd4702fdba25d9931a3a63df712549080d9f2fc6c82c6cc67f57a9abc7e27b31cfee4d0d1bf5e089f9dac727f899c0dc9a1870364977048681b3edfd551042b645bbaf1a658e19a61e1c0c9e9ed6d1d887cdb8a157d799b9545196e28bfa7394d46d6e76dfc86df57c371b8a2535106a9ea0c0d93065818136981d2043cb4fdca8488ebcce42dcc7c83308de0c3f4eab119261e1094769388d2258fa8a8c33d1638600cca58d8f44264d72d375acbd9db1317949d83139dd9d79bb9ae7aea02832d1d5d24d5a87e006bfda922bc51c432eab68127efa272c05a7773b48c0ba0a823ba2b3b98fd230f43e15551f136e5ae339481241c29767aaaad7a9917ba1b3cfb6f6f98ee9618ecd73e5a75eb336792f441042f7140f5115a3a8b443b5ebfad8803004cf4d4f14789b020afd56436d0099253fb3727dca440a411aad241c6b74da79a079a8a27b9b56d180071db26ddf9e9ddb6b3ef42d983fbba323551342e0a6bc01ad173da314c74a03dc49bc0754c90136ec08f513d5d262e76e82cc449bd66aca88160a7ba7425199d3485a3bbf55d025cfe0f49c65d28f5b03140830e5cf72bf94b18b2bfc2483e09ffbf5abbc8b40cbfd5e699eebf1623176ca3d11e609cb7b05ed25b4102d6da403777571447def14d3cde2e2baa1ebfd2d0f609c4ab0c6e398673574388e1ad0e9d35fe75f0e893000252633078a6d3d2fd59feef73985e69c6437831a4ecd16d790486de87a742d5d8db1f479d75878ba54dd200add30c435076c84076010d8d033f88bd227e7e79a7eb683a0d126f037fcb360326776c30d150f2f1d99720ade7c13d928b833ef7bca27715463244b6219987fb4d28c480134c20e580c1f3cc87c6d20d2107d742e19ddbcfabe6301e6578b7be5a1c61d2ccc82feeeacfa5b812f5f565d0c1ca4319cac9c2f954fa6aa15fe9fe76e6035b3d99712a862611e31e4ec9ffe9e60ca973e7adf7d93070feb1380ca192b0210845b53d5c5f78b97669734cbb2b6d2fbe0976e5c4c2d5db17f43441db9d33aad57b085bb25c37ff83c7baa822eac91c02af1afc2969188955d2db4c36d6fcb3ebd8f795c707a6dd2e9ed73512070736", 0x1000}], 0x6, 0x6, 0x9) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000006a0000006c40f115f896722c893f233cee6c96d93d07ea2bf602a8a7bf26914ada708c632559c705773d889c742649c5d9688322af97f3ccd1a75f246be634cc82ada80b1bbbe7049e1e3538ae8b9b95360b7e42ba7a367ae6778616ead88fda4e2700"/142], &(0x7f0000000040)=0x8e) 05:03:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000580), 0x4200, 0x0) getdents64(r0, &(0x7f00000005c0)=""/194, 0xc2) r1 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r1, 0x0, 0xfd14) fallocate(r1, 0x1, 0x0, 0x28120001) unlinkat(r1, &(0x7f0000000040)='./file0\x00', 0x200) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x4) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x28120001) openat(0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00', 0x40200, 0x82) r2 = socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000002c0), 0x900, 0x0) io_submit(0x0, 0x2, &(0x7f0000000540)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x7, r4, &(0x7f0000000300)="f61c437b358189b7d3fdfe7a50af0a4122a16850fa7492ed10f611ee2db41abcf0d51055ccdfd67b20a5e8b906b186fef2144daf840ca14a4cedb7bae255d30a8367b127826cf38197a6fc2e292428cf3f3f9c07b3685346dbe55b47ba9f78e5e4b679b20ecbe37995b401fbb5e7570bb1c0c15fa5dcdd", 0x77, 0x4, 0x0, 0x1}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x2, 0x4, r2, &(0x7f0000000440)="fc48be1e4a5afdacfd995bdd9a7ba340e2c591e162ea5aab2008ccc91abd40e3147c35ab302b48df8dad373e4484f4b9f11873f517f1c678a647277a7e6fe8415233c38637bb06c04279b317d360fe98f6a63d5a86bcc3fc08cc1deee4629f9ce0d10c054349fc35cc1a4bc5441af7a5ca60723881a51129f6c0179833b5c567886d05c5fbf308e6d061251124f84c06e704dcf205aa307832ec919478", 0x9d, 0x86, 0x0, 0x1, r1}]) open(&(0x7f00000000c0)='./file0\x00', 0x80202, 0xa0) 05:03:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x6fff, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200068008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 283.053662][ T1719] loop1: detected capacity change from 0 to 4096 [ 283.061242][ T1723] loop5: detected capacity change from 0 to 4096 [ 283.073825][ T1723] EXT4-fs error (device loop5): __ext4_iget:4847: inode #3: block 1048576: comm syz-executor.5: invalid block [ 283.074368][ T1728] loop3: detected capacity change from 0 to 4 [ 283.085559][ T1723] EXT4-fs error (device loop5): ext4_quota_enable:6432: comm syz-executor.5: Bad quota inode # 3 [ 283.102153][ T1723] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 283.108456][ T1728] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 283.128099][ T1719] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 283.152681][ T1728] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 283.161607][ T1723] EXT4-fs (loop5): mount failed 05:03:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f00000000002334b323d91d2daf00000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b000000000400000800", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000440)="387dd551d72e42abec9f067ae3f5ebbb490d61f9f0659cbe1d6c99cf0c6ffa32aa84abcd7880208617c54868ef1597bf362d96274e77457b847bf2cf707791743b91e1e23dc83e6770d570ad10927bc250ab48c23be2f430e41030cb18eeee2a1019c5c48244b1c3e76e35f6fc62454bda0c4b0e0ecac726e03734696a78dbad017a8181ed0fa77415fe428877fe4b8f17a756c8cb5f1932b52b7cc9f742cc507b80a8a0bb7e6f0d86eb3d7400f1d31fd108b0078ea4b05f1a", 0xb9, 0x100000000}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1004}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af348fa1185b49ee7b70000000000000200000030", 0x3d, 0x8}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000080)=ANY=[@ANYRESHEX=0x0, @ANYRES64]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 283.204303][ T1728] loop3: detected capacity change from 0 to 4 [ 283.215197][ T1723] loop5: detected capacity change from 0 to 4096 [ 283.225897][ T1728] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 283.237189][ T1728] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r1, 0x0, 0xfd14) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r2, 0x100000003, 0x0, 0x28120001) dup2(r2, r0) fallocate(r1, 0x1, 0x0, 0x28120001) lseek(r1, 0xf13, 0x2) unlinkat(r1, &(0x7f0000000040)='./file0\x00', 0x200) r3 = socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000327000/0x1000)=nil, 0x1000, 0x1800003, 0x10010, r3, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20006c008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 283.237847][ T1723] EXT4-fs error (device loop5): __ext4_iget:4847: inode #3: block 1048576: comm syz-executor.5: invalid block [ 283.258297][ T1723] EXT4-fs error (device loop5): ext4_quota_enable:6432: comm syz-executor.5: Bad quota inode # 3 [ 283.268894][ T1723] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 283.287361][ T1723] EXT4-fs (loop5): mount failed 05:03:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x6f, 0x80, 0x7, 0x5a, 0x0, 0x7f2, 0x0, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x7, 0x5}, 0x44040, 0x0, 0x4, 0x8, 0x28, 0x5f, 0x9656, 0x0, 0x4, 0x0, 0xac}, 0x0, 0x3, r0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000780), r0) sendmsg$NL80211_CMD_GET_KEY(r1, &(0x7f0000000880)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x5c, r2, 0x4, 0x70bd28, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x2, 0x5}}}}, [@NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x2}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x24, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x10, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4010}, 0x8000) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r3 = syz_mount_image$iso9660(&(0x7f00000000c0), &(0x7f00000001c0)='./file0\x00', 0x8ec0, 0x3, &(0x7f00000005c0)=[{&(0x7f00000002c0)="7e9d5d226a74f006cd6ced529e733612b2f38a6cc3a3f9855058aa5abf7f405ff1a77cdcfb2ea29684cdeff7283d6616d5cc9b15c2e9cd45b243a04e650ce5eef058d3727efd1d25dcd14be0cdd6246e71f926ec32aae1814766f3f322b4e2ef75868fbbc35f6c5d384c6fb91e406da6944ad4b95397f8acb5064178a520459ccfad25120d9ff29604f3b9f34f97917f57189b58f70c376cf05177840e125858ec6816a1a594a3b31f6a4b74b9a7955b26c4fb7a57312389b7131c6ad467422177cab2c5dd5a746adc9d0b10576e2fb890c9013a1506541ee8597b198f60b2155b", 0xe1, 0x69e}, {&(0x7f0000000440)="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", 0xff, 0xffffffff}, {&(0x7f0000000540)="fdc0a7c327bda1be4ba60550e19ad3e5d5c0943d5534ba7921b1ddf232217e6e149d7af6627fa73c4bbf3780c8bb95fdd588ad7f9a505842392955a086d8f2e797143da017ebb23a78f5e76aab85a883b8a3de334530247e1ecce010dde536bdbd9d889dfff5deb364feeee34a20b8ac9354d37ffd3496da", 0x78, 0x8}], 0x800000, &(0x7f0000000640)={[{@unhide}, {@overriderock}, {@dmode={'dmode', 0x3d, 0x80000001}}], [{@context={'context', 0x3d, 'unconfined_u'}}, {@euid_gt={'euid>', 0xee00}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@audit}, {@dont_hash}, {@obj_role={'obj_role', 0x3d, '\x9c,'}}, {@context={'context', 0x3d, 'root'}}]}) open_tree(r3, &(0x7f0000000700)='./file0\x00', 0x801) [ 283.381566][ T1814] loop3: detected capacity change from 0 to 4 [ 283.393883][ T1814] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 283.403998][ T1814] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 283.407141][ T1818] loop1: detected capacity change from 0 to 4096 [ 283.421630][ T1816] loop5: detected capacity change from 0 to 4096 05:03:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x7000, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 283.440792][ T1814] loop3: detected capacity change from 0 to 4 [ 283.447644][ T1814] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 283.461270][ T1816] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 283.463873][ T1814] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 283.510430][ T1818] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 283.565364][ T1816] loop5: detected capacity change from 0 to 4096 [ 283.583923][ T1816] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 05:03:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200074008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x403}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000000040)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x0, 0x28120001) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000002c0)={'filter\x00', 0x54, "2bb011b15efebd7c7cd85788005dc5cf4154576d8c06d61d4ebf9299c8375c46afc7473704184944ca3e7439a03a45ec456555846d933f585e0efcfd1c21f509516e648025ff8950ebcb3e2f4f44ae965cc2bed0"}, &(0x7f00000000c0)=0x78) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x9) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/8, 0x8}, {&(0x7f00000002c0)=""/205, 0xcd}, {&(0x7f0000000440)=""/155, 0x9b}], 0x3, 0xffff, 0x800) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x7800, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:17 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0xf4010000, 0x0, 0x0, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:17 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) r1 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r2, 0x0, 0xfd14) fallocate(r2, 0x1, 0x0, 0x28120001) unlinkat(r2, &(0x7f0000000040)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000340)=""/124, 0x7c) r3 = socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000440)={{{@in, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@initdev}}, &(0x7f00000001c0)=0xe8) r5 = openat$incfs(r4, &(0x7f00000000c0)='.log\x00', 0x103000, 0x190) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f00000002c0)={0x2, 0x80, 0x0, 0x1, 0x5, 0x2, 0x0, 0x6, 0x230, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x100, 0x5}, 0x11000, 0x400, 0xb2e, 0x0, 0xd75, 0x1, 0x81, 0x0, 0xffffffff, 0x0, 0x1}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000540)={r2, 0x5f, 0x3ff, 0xff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000580)='security.capability\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 283.936510][ T1884] loop5: detected capacity change from 0 to 4096 [ 283.936565][ T1883] loop1: detected capacity change from 0 to 4096 [ 283.947438][ T1884] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 283.956998][ T1888] loop3: detected capacity change from 0 to 4 05:03:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20007a008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 283.995646][ T1888] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 284.005450][ T1888] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 284.006418][ T1883] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 05:03:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xc) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 284.091697][ T1884] loop5: detected capacity change from 0 to 4096 [ 284.099815][ T1884] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 284.110306][ T1923] loop3: detected capacity change from 0 to 4 05:03:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x8102, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 284.136999][ T1923] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 284.146588][ T1883] loop1: detected capacity change from 0 to 4096 [ 284.163025][ T1883] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 284.172035][ T1923] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x5}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x21}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x60000000000, 0x4}}, 0x0, 0x8, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x2) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) creat(0x0, 0x0) r1 = socket(0x1f, 0x80000, 0x7f) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x10000001d, 0xffffffff, 0x8a) ioctl$INCFS_IOC_FILL_BLOCKS(r2, 0x80106720, &(0x7f00000000c0)={0x3, &(0x7f00000005c0)=[{0x4f9, 0xe1, &(0x7f00000002c0)="58140177128f06a4240e3f90b656bfc506f6c7f1607f66b48e8802a2530ea741842ac736522799590f85623bc8a5b01b3cf7fcd6b935b353ef695e9d760bad2b12c61504dc92c38a89f0c6285bd42d13a05a6d06a0cfdf6f8dab07feff9be4fffc24080c83f58a27aec3e1c5e82b6e1c065f496fed50f163ca1169f1016a212b9ccc82f8786519a0c879e080e1d39a41815d424897576a88e247464dd7f96e3e706bf64a7d4ae3280316c3a0ce536597dc5dd2fffb145f6b0a749b9db982c0ea075f3691a779a4a01eb67e0d483c77f55dd406d4d2103fc37bc40b9ef8b1577dae", 0x0, 0x1}, {0x3, 0x5f, &(0x7f0000000440)="c4abd33f678e6d747cf6bcc650dc0fa934a9435beca7f02ef8c78800236a52054971c08bfb22a07d0023c3fcb79e61a7d8f89047d5db9b3a7ae52480956783eca6a6383215044c8a4bf9d2857f4a3f965aee6ee24b46b552d63eb933c8e8c2", 0x1}, {0x8, 0xea, &(0x7f00000004c0)="0111f104cc6f59b6e94cc9d36b84b5841cb04fc5348e936c6c847c5c15cdd1f17b0f09052e1b3d179f8880a9b4a8d6f883686fde65469b92eeabf05108c0201d3e4cc1f4d5419661ba77daf80364240024cb236b39d1ce21f038b8990633e94490e3f1eddf7bef7b80ea5ba7f829b1ace3028a0a5849b50c08eb5244700e06798ee7f7115cfee624211153b01411cb0190c2e3833448ab6d4cd39e5860e290a3cc6191e3d4962f854e811fc19683e9bfdf18e72df01d917ec66b7601f33f7832ed8655a09126f36316281dbe7dd76cd98fa5e4377980eb06efef49edc67b5ba3c2d8b24610e6010fb9f2", 0x0, 0x1}]}) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x400a0, 0x8) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)="ba1e01969a052fea79b76720b247da23f6533fd6481c728e1001ec7fdbbd83829a77659ce9f1daf975d5254970ff52bede724d886fbe7214f5c14b2ee6", 0x3d}, {&(0x7f00000002c0)="7ba8560ad180360846c92d23caf8d339a28c013f9f68d0d7778aed117af1e198bf3ab5cb20ac275d53fe76f49c3eabf5b8983520dbdbb82cba509a2c5728d2a415b1f6352993f459aa97c90459cc3bdc8be6714aaa41a40c9a0fdbf98d7bd3e81059512ad79460d69a8e89ad94d68fef78dae575427c06ed9ef9348400e3d1daf2a360fc7f8590d6c574a6927064a4ae104156d65b11ed777ee0b9d99286941c81ebdd480cf0be9634a4e67defb40b8740b4f29737d6", 0xb6}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001440)="ea343bec4ef02d3bfc139eb28a7216f424e41ca2b68d8cf54e4419f0e68e68ae86e076cca01141eba0c1bdcc15640fdde7128bfe1ec00f54c62e1814afad7e1c26d8cea1e3c12bcb95171c12868ff1f4274bc0b5c71896e53995e7afafd0e3c95f26c152028c650b4e2bfecb59", 0x6d}], 0x4) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = creat(0x0, 0x194) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0xfe07, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 284.261322][ T1923] loop3: detected capacity change from 0 to 4 [ 284.289316][ T1923] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled 05:03:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r0, 0x42, 0x3, 0x1) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x120) fallocate(r1, 0x1, 0x0, 0x0) unlinkat(r1, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 284.347414][ T1923] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 284.362240][ T1981] loop1: detected capacity change from 0 to 4096 [ 284.364273][ T1983] loop5: detected capacity change from 0 to 4096 [ 284.380803][ T1983] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 284.390620][ T1983] EXT4-fs (loop5): group descriptors corrupted! 05:03:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000f3008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 284.499322][ T1983] loop5: detected capacity change from 0 to 4096 [ 284.510993][ T1983] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 284.520856][ T1983] EXT4-fs (loop5): group descriptors corrupted! [ 284.531986][ T2017] loop3: detected capacity change from 0 to 4 [ 284.543361][ T2017] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 284.560299][ T2017] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 284.589003][ T2034] loop1: detected capacity change from 0 to 4096 [ 284.612645][ T2017] loop3: detected capacity change from 0 to 4 [ 284.619650][ T2017] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 284.635221][ T2017] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:18 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:18 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x6}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0xfe, 0x0, 0x4, 0x0, 0x7, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbb, 0x0, @perf_bp={&(0x7f0000000340), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r2, 0x1, 0x0, 0x28120001) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r1, 0x1, 0x0, 0x0) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r3, 0x100000003, 0x0, 0x28120001) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f00000000c0)={0x0, r1, 0x65f, 0x1000, 0x20}) unlinkat(r1, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0xff01, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:18 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000040)={0x1, {0xc, 0x9, 0xf77, 0x200, 0x1}}) creat(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x0) chown(&(0x7f00000000c0)='./bus\x00', 0xee00, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000fe008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:18 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000440)='./bus\x00') r1 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r2, 0x0, 0xfd14) fallocate(r2, 0x1, 0x0, 0x28120001) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r3, 0x2, 0x0, 0x28120001) r4 = openat(0xffffffffffffffff, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) sendmsg$unix(r1, &(0x7f0000000480)={&(0x7f00000002c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f00000001c0)=[{&(0x7f00000000c0)="35c33ffc", 0x4}, {&(0x7f0000000340)="cf7aa24837b4249c5be91ba697aaf84f1266b71698f00257da4930e4141d1086ce55c8c9c2567b6c20d6ddda933bb064c0cec9e5a511bb9e3308013bdd81e4d025d9133dabab4e989b2d2740a282f0fcc830080d", 0x54}], 0x2, &(0x7f0000002580)=ANY=[@ANYBLOB="180bb40000b75351b98d30670b41a0cfd8f6bbae5d883da16332010000805ede8e10cdd01242b0002b5f00", @ANYRESOCT=r4, @ANYRES32=r0], 0x18, 0x8000}, 0x8a639784c1ca3a3c) unlinkat(r2, &(0x7f0000000040)='./file0\x00', 0x200) vmsplice(r2, &(0x7f0000002540)=[{&(0x7f0000000500)}, {&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000001540)="b78a270bbdab2051ceb8d0685a0f3738136997d6a44b8ed2ee0b018217893ef8be43933588c2818f74a34f9efcc797ae58ec86a04bd127b94c769ea4931a9a093e9704b9c29d82dea19c0f9f70786daea6e1d01e0c7c82e80b7a3990292b7490bda911af203a5f28415379735898b3e97dd49ac6278231f5e80b59dae4562783596e29b517f8d83884c35669b4d061e1b5c50477a929a4d0a93f811f35bf982125d69527201ba2bd776a58d6120bafb4adcb45619b8f3a6afcab359e153c35757eb0702145273fedcd794b3c4859e456ecbb26cecda95f42082ea94267c34a3cfc6e55eeec02182617048d4ceb51a42de166946a764e384365696aaef03f15d8a42f5af2882570fb8cb3639fdc34d8b5b0ee34e6b11049651d301f8d54d3c9955c1d9c60a573b1360dc6f2fd1e30ff30676111fa828c00c0a1a061f80ae6709ad656fbaf1f9928d13d7b4ac8e8d59a8d8337632ed4b8b1ea5c61c959901b8b8796761284b4766df8dfceaf83fb45dcadd65d46f48d29672fe2e49eff468194c1a0e15d3bd19bb0a2d2006f5cbf7d890aeb6a85fcfb861f1c46f57b48e4a5179e9ca9134025e1f56af6b257082f6b19f83c3ed8ff883a3c888b0a0c4a309ca188e222000b03596e6ddacc432d209cb3b42dcb78112629c623944de2ceece0d8e3cc786d126fb9f28f7e80976164449af445b72c4d72c5c3d49f5a2b60fa3231a55ba99bb66d77090912acddf051b05f0a0ee9bc6551483f5108ab0df6549b383ecbfb52feb750eeb7eaadce4ddf52bc41b0311795eb0b5291119e5e6bedc18ab449f5a7e8e5ab3de7e2ef7b58e16600aef91726c19e8de21393bbf19e1766f15118ab4321daf5097fa32cca2468c8539ef02d4cb7d042485c03e050c60d3a3d9af06a93cfb60eb8dcd232829bc7dd30edae2682a80df855fc1870a503765986c8a1ef24489a7e64c1b95595ecc15153bd7f6cc81fbda7ca01e42f438034a4fbd6a14eeef839e7637edb047d64e2e3861e5d7de9288e344e567834a6278347200c225681900afe614be7ebb6979f4dc28ea8d0ef163b13899bce009fcd21fc66c0cadadf4c6914823a3ef8303e6baae7df71a00b3746a8e106b4484bf22d8626ddba7f0a018c91350dcb54e8555039f124f9f1c920a71692f6e593f036102a8fb8af05200498043169959eea49bd92ef6c1add601d361eeea2514d9d6b97f63fa5de540aafe60e896ec6f65aced3f01ca23f4d91f532245a26afc2ba1ef8325db0bc8c8ef12a82785623f5de6ef70d6aa5fb0164155bb7cf597c342a8d8137780644a9d6a14136ca937762398ed810e709ff051ef9004b68c12383ae25074dd8e93392f07c952aa0a9cf93b33ec51151d133e8427b22a11746637a04c3e677a52700bbb9bac43ed62157e89066a40c510b77a7527c162a1ba84163349a3cb6eb5e37bc1114f8317d804e2508cf383af4a2ffa2d96786a69d0d444b4261da0d32ca0272ac0e90b515bcd2f7756c8fe03b53a93391302b53b4ca5aad22d436291cbd9c660338d999a611777df5547bab1ed470dc5392c95bd8d1c4c1fee47cee384b15b694ce953f27014f2e3eee1cf7014d8e9ab95bf72660921ad4edaf6a0c2ee89d924b484520db44d47e109a71b4730de2d32279fd7c1389f48160cc3082c1b39ba3ea49c1989fb248f88c0bf482e6711e6b6b742f244a5d4e690151f5c96200b44327f8ee09cb0bededa717ed5bebc8177f49c1bfde87a38a205ac07902ab413bc6b7f88adb7de978e615cca11765534e8263c6b3193bef92fdeb06c02bd4f3fb9cefecfa7bebd5fdd64ff5ec90736bcaffdccebcc23261af91a53d73331096f0ee9b124fe9247912c2b02545602c9047eb9b3a42df0b8ef0791ff8b3afed5daa2ac39b2f8c9f9cb51145c222f8b7c58e8c7d3f4c62357411174b1651e16ce9ae4f28bca74c9617c9f4ff6a8e64ceaaec21edda767745db499a216b7543d5bccd989c46ec2d332be6022a3de95b3027da66b2f35fd817c1d8c4b421c4006d231302d7ba7e2fe6a928decb1e5e1feedc91fbc12067af3af0ffe66324023327c5c5281a5183b9921154a837d541116ca24e4638591d49307bcea70c9f4a4b0ba755a67173433835aa99698e51cde3a8a7439fdc12b05a35fa1da3739704191da9fd2424a5fd7dacb352cb8bc317a834d4f91995ef37633c0f58acfc5642c579a7febb7c72f95d6c02f462d06b4ec505447e336abeb4662f88f41785979dea872c4b00a65f791800637680dfc30405bb6505fca7dac64b35e0ffe9ac82780e57ee819fa07571c9e3839a1ae6845045846b8c87b6af62455ada630b55da77c12ed01c982f7e8f8b3318d3be06b04cb1967ef05ec9c799a1f88ed909d760660619cd8edd9f8c8d05ea8e3fcd192fcce2d4ddff6695a0165600aa6b26c3470c966a049325c956608eb18a1f3dd5801b0481b65f7f841278e44bace54158a2e16ffa0935998e7e79f88e05f9de417d54be59ed7b771f6ef056c2292cfa35bed48f96434b2de89daa4f0c7ef2a9af671aea8b3c14689953c947dafa1c531c818d7aa8e917201284f9036f2afdffc4eab12e8e9127477c3c518100f6224f23496efa07400b352bf49a324fa86e0ae327ae023dd6aeafc75978b507926162879feed9f9b601f4e8a255b22032b64fdf9812ec7922ee5d6e5d38a42b921440585ab860db7559279a069887be6c9c13319a3aa35276bcb8d3715e9b192491f2b6ba5f390e40a9b4faf954383ead9f1ecbf9591ecba8590c1debeec27afca58be36a1039cc822c28233cecac6ec99e6a9152abdb40572580ff3fcda66afa2440a94bc3f0c14e4ffbc57040ac0f31af0f7f42fe1297d46fe88ded5690ba66caadff057ec1e16cf052329e9dd600ea08f71893ddc36b283e0c4e504de5400c6456cdb29b41b051652fba1d0d5c582ea354295d93f91cf62f50792fce2a7e3dd1099f0e35bdd6e33799bbc074862b9960b1a0f02c16a24be0e847dc4fcf2c6d4be2a2e741ccac3afad354c5d72568595eec269f4723aef2cf97e4200692c178deb2a6215d8c9477de6bcf68baa5a620f5e5aca620bda55aa8c3e64e6cc80fb38422abce85c2cf9e7762174d8a5efe90a471b5bbbf1a9f143d518ec04489183d974ba04408b00c4d48fa828fb5d14515178c0f33af95a4580ae3d786824786d1d5f4440813daab5def55ff8ecb01be3eb92bf1f5fc5a6fb1ad18c35f12383ae83b866fe64818df25b20f741af3411ffa34e3ddcce8529ee1d385f248f59d806b11cb3e252a48c7ff4d0862aedffe6f5f493ad6e9b61cf70fd1e941320158083e70fcf60acd8d025190becef3285d30771c1387f4cc8eab515b5707ac1637af5894956f7580c35aed78c985f22b5b4d1e17fa4abcd2cd08c1a293271e0cb12084ad7b6eb419f00cc512e21cde2375bcbe78a29c5750eb1dbbbf5ba720eabb9cc96f192e1aa027feb18fd4b88080bc707ebd684a59d1c2987e4d3fbc900292f15ff32c11a495b8d1a10826f3e47265bbcf8d77e4b33181d3fbabb758ba33e1645a556fe6c7948b0afe80a4e96f0d40b423e5068f7fac66506715c3c65e29e525503070e5502f0b9b1865a711179850e6da070680c90414c03832cffb63dc6d3ec485174dee05b4d5cb0af6c2dff463671fd5a21dea006a9fed804c47305549f994a0f38599d9786b460b965a82de108ab84def3ef41c6461723a1dac2583e3c3fa251b1906b5aefb9ba38df5a5831721b74fac284d38eceb99f9c719d3d86c67b274e5ace5fe821e6ef05cb1347a65e0c3d9d6d801ad36e73c168c12ea09a2b38ec818b0d11526ce54547b1b1ba71655fc7a10095b314272de99d6b00750ad29bb605f4f8b267dfc9352a10493b66aec4f4c19cc59c743aba038ed46f97634dd9a813398413fc5f9b1667b201360da015a3f0215068539e6b2c266f355381df4384690d514427c04c7ca2d1051bc2876cac2e62ba56bce1fd869f46856a0b08e7e25a74a887a11610833b45eb03522825650954bfd83aa0cdfaee17d44267b343c141aab31c4acc78f437fda13321487b2bf91e981f34929185fcef56cba19f8c53fbdd6870dfc8a1382ae389f66a2ddf7dd02e70158548fce2196d5ea43038233838ed2529600eb38a15c76f8d147cbb1ec4acf6302f592ef57328fb28c82a350bfcfe1a68eb08778fbe47f3a473919d0a1500c7d60c07829ac5c283252566ee991ea858a1e8b30eba71fc9dc639dcb41b6aa1b22592e3e9f2779c01045d6ef99cabacde54ad409bd8355cc6a6f33f3563d1d8be92d5c80b90c0d9c0acefca371746e1cb62d83eb75877be77411a89bb1a091eaa6d7dbfb510686bd13e3ae8869f7d38ac15e3c7028fe5dd8dbbc5c7f1bf50a5a7c0a4d0c0dc08b6e92919a7cd8c5375cdf898ea98c8398518b85da9f1a42a49a57971413dd5309dd04f85864b822a5e1188c8f618fbf71e58dbda0f3ffcbbf86db9bcd35bce37d12140ca567620f2bf0edb62d2099c5e476ca4daa2358d5a178d2bd36ed6b85e98dcb42cadc6ba471e4a9db6d3c9d86b1b46dc2163bf040fec4fe0aef23c295a709031d0b343eebba56c22b5c5b1bb7a101ab49740ebd96ba38bd760a2529b2c1f2a148ca504026639019a5779d2efcd8ad3a752699c870a3bb7b1b31111f49953fd50c23c1bb6eeeefa00ffcb1d5352729432023f81e827ec94ef9a061844c378337213b64fc10f01d1023d36e4df30a1a737dcffed582c32c520409dda81645574f0f99f6014f8d4b9a4104fe7388e09ecf6c93f5bcdadb3de2196f416cf377ee89a87913e6aa17b8dcd39bdcde0a635a9a2d6e23269e4e4a4de7ac67cb8427c8863e4c1f19a7164800ecfdd66870422d47378ffbb8f75a297397c30dce7b42289c4682e6377381d23c7e85c631eb60fcbfdfca7c9cfc8df3d8f205859c6c7c1e6e87bbdb7aae1785d1fa9403a570cd4670a5fb031240d3bcaf17bb2b7db28c8c45aecca8914c680ccebd6143c68628b9c3e9147c3d8af6c6920f3767f4618b8a39bd1977599752494a2ca3a90c03c8d0870f26f3630c7b6b506087265d315d597c998e0d89090708e8da298b09a31513e6d5ec7c1ba62c12763f627396c6b31b60496c69c88f50a977270ec661fde2b0c78302f0331fda7778f6c2be0b8024ea6dcb1005692af7926b6504e4c8e7daebff32442bb37894be8fb7ceece264c8773e49b5d71afa290fa98a57d466295d0384e2be6814230292534ef90a96f4dfd4bfe1b367c1ef5439b201414f9067cccdae77e59d29db0dd869519262193ac964f41844839f41dea680675494450d520adc0f7bbba73a35f2219f2f50e72382e253150d5d123e31c173dd3755f0612857d9efd2257e32c43aca05abccc8af13f4fc8ec67f21ae6f9fa2ff4cd5eda615f94d50f80ab8585c50543a50653fb30dcbee934464df1e623d96acbca3ddff3308a3f1a84ca34341c57ef2ff533eca95b75cb1252ca37e3645b8eedc916f6f73ed9187e334da6c4bcbc4a8382d10f63db8bdea44be5f210e7a8674a897f333aa670a90c32f87e7f4458b0cc78831ff6b110c3b97403ba395a5e263261be0ed7f3cf40d478a5ade277c14b26700eaac80ac121ed9c0b7a26f9cd3584d6c927792ae4153d770429c2c36532242ad4308555676288acc474194e9ac052d706c7d956392633b6b22ee8c2c8e2ccf1f186dd6d949282e9563be8235df1e7697c02950ca19e311c5556d67a45836ea06d0338ac59d5cd60998ff0501b94fcbdcb7", 0x1000}], 0x3, 0x2fd71fabd72d84b4) socket$inet6(0xa, 0x0, 0x0) r5 = socket$unix(0x1, 0x0, 0x0) close(r5) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 284.851394][ T2068] loop5: detected capacity change from 0 to 4096 [ 284.912884][ T2077] loop1: detected capacity change from 0 to 4096 [ 284.913802][ T2075] loop3: detected capacity change from 0 to 4 05:03:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r0 = creat(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x100, 0x0) inotify_add_watch(r1, &(0x7f00000000c0)='./file1\x00', 0x409) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r2) [ 284.961644][ T2075] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 284.977250][ T2075] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f00000002c0)="80daf4655fdaf465351b22833a96645d0bffcdfeb8ae5f000000000000ba863070000010000800000000b60af309000000642b000000c8e56063ecdd29d1be30390000000000000002f1ffff2f000000000000000000", 0x56, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x0, 0x28120001) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xffffffff) r1 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r1, 0x0, 0xfd14) fallocate(r1, 0x1, 0x0, 0x28120001) unlinkat(r1, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 285.065982][ T2075] loop3: detected capacity change from 0 to 4 [ 285.074904][ T2100] loop5: detected capacity change from 0 to 4096 [ 285.092803][ T2075] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled 05:03:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$BTRFS_IOC_DEFRAG_RANGE(r1, 0x40309410, &(0x7f00000000c0)={0xfffffffffffff801, 0x3, 0x1, 0x9, 0x0, [0x5, 0x7fffffff, 0xffffffff, 0x6]}) fallocate(r0, 0x1, 0x0, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000ae1b50aedc543360600551ef51de75d2e527703378015d80", 0x1f, 0x4e0}, {&(0x7f00000001c0)="024262c05f3871571b7336de0c9c2a02fa76a263f43afc20bf849dfcb89f9ccd", 0x20, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x28, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 285.122451][ T2075] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200004028000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 285.175737][ T2119] loop1: detected capacity change from 0 to 4096 [ 285.194405][ T2131] loop5: detected capacity change from 0 to 4096 [ 285.210552][ T2119] EXT4-fs error (device loop1): ext4_quota_enable:6432: comm syz-executor.1: Bad quota inode # 3 05:03:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) unlinkat(r1, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000580)={0x2, 0x80, 0x40, 0x20, 0x0, 0x64, 0x0, 0x1, 0x41, 0x9, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0xe2e, 0xfffffffffffffffd}, 0x1080, 0x1, 0x955e, 0x9, 0x81, 0x9, 0x5, 0x0, 0x7f, 0x0, 0x5}, r2, 0xe, r0, 0x8) r3 = syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x1, &(0x7f0000000440)=[{&(0x7f00000002c0)="b1c2cd4fd22a164d5986cfac7770e9b881e81c5ebd3853a2a2055d067938b9bd6980458b6203c70a5785282ae3b2ddbf63b605f622a9af66d7da2ea3efc14f71babb1e9e25bc18ed40424c9846b16d4abb6116f310c86e7ffe24bf3a1b1ceca738f35ddbfe45bd6a199580c5942d1417834b84c4431723de6dd8d9d9fe4400a0a38fc5de9ec496829a14350796e8380311a89af335283b4986f7946581d9aaa01f45d4eb7af2f8d129134e5675fd0ac939e76ed79b9ac88f38fdf7c477d12601725de2fe46ed44cf", 0xc8}], 0x0, &(0x7f0000000480)={[{@journal_async_commit}, {@data_journal}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}, {@nouser_xattr}], [{@fowner_gt={'fowner>', 0xee00}}, {@dont_hash}]}) write$binfmt_misc(r3, &(0x7f0000000500)=ANY=[@ANYBLOB="73797a30169b8a25a481620f2e15556cb6c7fb07f83ae0ef0e2ac811f9e1eb7945af959c0a88277cd5e0a82c2fbf0023eab93d76e5bf2f62e03f756376a9c255f3fcf70a29ce61d4133d14918dc9400bae575b71bb8c2d"], 0x65) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 285.221175][ T2119] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 285.248728][ T2119] EXT4-fs (loop1): mount failed [ 285.291766][ T2131] loop5: detected capacity change from 0 to 4096 [ 285.309083][ T2152] loop3: detected capacity change from 0 to 4 [ 285.336839][ T2119] loop1: detected capacity change from 0 to 4096 [ 285.359207][ T2152] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 285.368725][ T2119] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 285.382479][ T2152] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 285.426581][ T2152] loop3: detected capacity change from 0 to 4 [ 285.433201][ T2152] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 285.443208][ T2152] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:19 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x100000a, 0x810, r0, 0x8d2f2000) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:19 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) r1 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4, 0x1010, r1, 0xc4c82000) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r2, 0x1, 0x0, 0x28120001) ioctl$BTRFS_IOC_SEND(r0, 0x40489426, &(0x7f00000002c0)={{r2}, 0x5, &(0x7f0000000040)=[0x3, 0x1, 0x3f44a306, 0xff, 0x7], 0x7, 0x0, [0xa16, 0x9, 0xbcc, 0x27b46b68]}) creat(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0xff07, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000002c0)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRESOCT, @ANYRES64=0x0]) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000440)={0x0, 0xfb, 0x10e, 0x2, 0x8, "48c7d7e385c03a736516d04dde05c169", "32dabaadb903456b6fc98ea738fad05949aa42fe84a8f019305607d5140cf64b16703c22fdd06aecc39baa2b83fcca03548b794a2c72c0d53ccc64a1a5d8e5c01dc218bb2199406134a173b4b14d2f49b2a7e75200ef5578dbb6e1e82cf78628ebcc8c7de21d49bfe58bf747fd900f68337d5a7b1d138526b7b85b0dfa3bbd14a11fabe0792dae933396918e0152ba9ddf139b23fbfb644669974fdde3e025248e6f1911e610de977b8b993b6ec9139258c1661fa1a99a54f8d3217ce46ae45369f89d0538d0c07d4ba3a3ed0ce465ca2dbf701523a6d6680f64ad242c4138be98d72af827284bbc8e9660448d5c1de7317b58612b79f01ab6"}, 0x10e, 0x2) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0xb1) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000038000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 285.733295][ T2197] loop5: detected capacity change from 0 to 4096 [ 285.744907][ T2202] loop1: detected capacity change from 0 to 4096 [ 285.753814][ T2198] loop3: detected capacity change from 0 to 4 [ 285.758043][ T2202] EXT4-fs (loop1): Unrecognized mount option "017777777777777777777771844674407370955161501777777777777777777777" or missing value [ 285.788518][ T2198] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled 05:03:19 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b00000000fc000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x200000c, 0x50, r0, 0x2e08d000) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r1, 0x1, 0x0, 0x0) unlinkat(r1, &(0x7f0000000040)='./file0\x00', 0x200) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r2, 0x100000003, 0x0, 0x28120001) preadv(r2, &(0x7f0000000540)=[{&(0x7f00000000c0)=""/53, 0x35}, {&(0x7f00000002c0)=""/207, 0xcf}, {&(0x7f00000001c0)=""/19, 0x13}, {&(0x7f0000000440)=""/15, 0xf}, {&(0x7f0000000480)=""/17, 0x11}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, 0x5, 0x3) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 285.837927][ T2198] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 285.863397][ T2202] loop1: detected capacity change from 0 to 4096 [ 285.893723][ T2202] EXT4-fs (loop1): Unrecognized mount option "017777777777777777777771844674407370955161501777777777777777777777" or missing value 05:03:19 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) connect(0xffffffffffffffff, &(0x7f00000002c0)=@ieee802154, 0x80) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) sendmsg$TIPC_NL_MON_SET(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)={0x1a4, 0x0, 0x0, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7f}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x4b}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x4}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x6}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x45}]}, @TIPC_NLA_NODE={0xa0, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x40, 0x4, {'gcm(aes)\x00', 0x18, "674ad159ebcecd3a51d736c940095d470358ebb56065982a"}}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "5f955ddaca2bb409721ccdc5e3073cefa8b2d605f18bd764952bfdc818b9"}}]}, @TIPC_NLA_SOCK={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x40}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3f}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4e}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}]}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}]}, @TIPC_NLA_MEDIA={0x64, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x72}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}]}]}]}, 0x1a4}, 0x1, 0x0, 0x0, 0x2400c811}, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x300000e, 0x8010, r0, 0xbd1c9000) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0xff0f, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 285.957947][ T2198] loop3: detected capacity change from 0 to 4 [ 285.969288][ T2198] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 285.979149][ T2198] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:19 executing program 4: fcntl$lock(0xffffffffffffffff, 0x23, &(0x7f00000000c0)={0x1, 0x0, 0x6, 0xfffffffffffffffe}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x80, 0x3, 0x81, 0x7f, 0x0, 0x0, 0x20004, 0x9, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xffff8001, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x4908, 0x3, 0x4, 0x1, 0x80, 0x8, 0x6c7c, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x4, 0xffffffffffffffff, 0x1) socket$inet6(0xa, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35}, {0x1d}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000c038000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:19 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(0xffffffffffffffff, &(0x7f00000004c0)="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", 0x1000) r1 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r1, 0x0, 0xfd14) fallocate(r1, 0x1, 0x0, 0x28120001) unlinkat(r1, &(0x7f0000000040)='./file0\x00', 0x200) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000440)={{0x0, 0x80000001, 0xfe0000000000000, 0x79f3, 0xdfc, 0x1, 0x45, 0x1, 0x5, 0x9, 0xffffffff, 0xc8a, 0x800, 0x1f, 0x2}, 0x8, [0x0]}) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet6(r2, &(0x7f00000002c0)="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", 0xfa, 0x4000000, &(0x7f00000000c0)={0xa, 0x4e20, 0xed, @remote, 0x29}, 0x1c) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000668000/0x3000)=nil, 0x3000, 0x1800003, 0x10, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 286.052681][ T2269] loop5: detected capacity change from 0 to 4096 [ 286.099060][ T2279] loop1: detected capacity change from 0 to 4096 [ 286.128184][ T2282] loop3: detected capacity change from 0 to 4 [ 286.152479][ T25] audit: type=1326 audit(1620536600.052:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=2271 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 286.181596][ T2282] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 286.206712][ T2282] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 286.231839][ T2282] loop3: detected capacity change from 0 to 4 [ 286.239319][ T2282] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 286.250792][ T2282] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:20 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r1, 0x1, 0x0, 0x28120001) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f00000005c0)="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", 0x14b, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[@ANYRES64=r0, @ANYRESOCT, @ANYRES16=r1]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0), &(0x7f00000002c0)=@v1={0x1000000, [{0x200, 0x1ff}]}, 0xc, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0xff17, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200002048000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 286.609632][ T2331] loop3: detected capacity change from 0 to 4 [ 286.617234][ T2332] loop1: detected capacity change from 0 to 4096 [ 286.634486][ T2331] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled 05:03:20 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x4112, r0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) creat(&(0x7f00000000c0)='\x00', 0x44) write$binfmt_elf64(r1, 0x0, 0xfd14) fallocate(r1, 0x1, 0x0, 0x28120001) unlinkat(r1, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x10) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x4) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$FS_IOC_GETFSLABEL(r3, 0x81009431, &(0x7f0000000440)) [ 286.663520][ T2335] loop5: detected capacity change from 0 to 4096 [ 286.674319][ T2331] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 286.684301][ T2335] EXT4-fs (loop5): invalid first ino: 3261084427 [ 286.742890][ T2331] loop3: detected capacity change from 0 to 4 [ 286.752094][ T2331] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 286.766797][ T2335] loop5: detected capacity change from 0 to 4096 [ 286.773355][ T2331] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x3ff}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) setxattr$security_capability(&(0x7f0000000040)='./bus\x00', &(0x7f00000000c0), &(0x7f0000000380)=@v3={0x3000000, [{0x718, 0x2}, {0x1, 0x1000}], r0}, 0x18, 0x3) creat(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 286.791234][ T2368] loop1: detected capacity change from 0 to 4096 05:03:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200006048000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0xff1f, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 286.879310][ T2388] loop3: detected capacity change from 0 to 4 [ 286.889811][ T2388] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 286.902845][ T2388] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 286.909000][ T2398] loop5: detected capacity change from 0 to 4096 [ 286.924953][ T2398] EXT4-fs (loop5): Invalid log block size: 251658240 [ 286.964613][ T25] audit: type=1326 audit(1620536600.862:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=2271 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 286.992892][ T2388] loop3: detected capacity change from 0 to 4 [ 287.009901][ T2388] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 287.024275][ T2388] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:21 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r1, 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x40089416, &(0x7f00000001c0)) unlinkat(r1, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) r2 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendto(r2, &(0x7f0000001440)="8bc6228968100df7a2f95cb0ba1254dd09b6aa0826a5659ac9867eb49b63917bbdce14128cca0bf8ac75abc33e88b7d9c8d3974fdd418670bc68c4a1e00239c207ec480973240688a67a290b68c805b755b3c93ecc625f7147b12e166841e1c810217fe839f97b089a6e", 0x6a, 0x2401c055, &(0x7f00000014c0)=@rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x40}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x110, r3, 0xa9b5e000) lsetxattr$security_capability(&(0x7f0000000300)='./file0\x00', &(0x7f00000002c0), 0x0, 0x0, 0x3) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x7ff) sendfile(r0, r1, &(0x7f00000001c0)=0x9, 0xace2) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000280)='./bus\x00', 0x4000000000200002, 0x61, &(0x7f0000000200), 0x8000, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2200, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x9d, 0x87, 0xb2, 0xff, 0x0, 0x0, 0x1ab18, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80, 0x4, @perf_bp={&(0x7f0000000040), 0x7}, 0x4c, 0x80, 0x2, 0x9, 0x0, 0x1, 0x81, 0x0, 0x81, 0x0, 0x87f}, 0x0, 0x10, r2, 0x3) lseek(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x2, 0x711b1ddab077f6e4) fcntl$setpipe(r0, 0x407, 0x2) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0xfd14) fallocate(r0, 0x6e, 0x2, 0x28120080) mmap(&(0x7f0000681000/0x4000)=nil, 0x4000, 0x1, 0x10, 0xffffffffffffffff, 0x810a1000) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.mem_hardwall\x00', 0x2, 0x0) close(r1) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 287.132130][ T2437] loop1: detected capacity change from 0 to 4096 [ 287.154121][ T2436] loop5: detected capacity change from 0 to 264192 05:03:21 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200010048000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000000540)={&(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000440)="a9f6a46fa62540f328a314248bdbeff65c740811c9850b46ddfa6c7156602775ff9f5a24a97c9d2264446692e3d164682a885c89f5bbb73beabe2aae3f59db966c61785fc0110baef50799f661c4301cb29f5e9bcce851fd7f91a5f117eb81a21e66db62f13a8bca03b1a9e079511878ae5ff4a43a4897c755a9d864c065257da7c2739dcb58de0d4a641886d8c8dc05594054014988093b58d2648255141914f554cc2f8e", 0xa5}, {&(0x7f0000000340)="428e0c106e51f35ac64044201a95df911a2636ddeaca206bc3daf13123af5a73d3fee7574539061a95b1c185d7d032f3fa2d7ad92872216c749e630fb9b5688b71933af6b377", 0x46}, {&(0x7f00000000c0)="3a1b75829cd8883478a4ba2c5ca504392c9db106ceffaaae755b7b372a84ec", 0x1f}], 0x3, &(0x7f0000000500)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}], 0x18, 0x804}, 0x40000) umount2(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0), &(0x7f0000000600), 0x2, 0x0) 05:03:21 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) chroot(&(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff}, 0x80}, 0x0, 0x0, r0, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.swap.current\x00', 0x0, 0x0) creat(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x0) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r1, 0x1, 0x2000000009, 0x28120001) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) umount2(&(0x7f0000000180)='./file0\x00', 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) 05:03:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0xff27, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f00000001c0)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) r1 = add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000340)={'fscrypt:', @desc4}, &(0x7f0000000380)={0x0, "77e74701b45b87b2a6ebf521a3a3249fca25a2a2396a7249290f7b67e47e1f05a5e7decb6c3db39e59fe0679c26e6381f5b4dd745569279a652f48cd8230d092"}, 0x48, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0}, &(0x7f0000000480)=0xc) keyctl$chown(0x4, r1, r2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000600)={@desc={0x1, 0x0, @desc4}, 0x21, r1, '\x00', @c}) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r3, 0x0, 0x0, 0x7) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f00000000c0)={0x80000001, 0x3, 0x3, 0x8, 0x10000, 0xfffc}) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 287.493140][ T2480] loop5: detected capacity change from 0 to 4096 [ 287.505760][ T2479] loop3: detected capacity change from 0 to 4 [ 287.522332][ T2479] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 287.531927][ T2479] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7, 0x4, 0x98, 0x0, 0x0, 0x7, 0x8002, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x10401, 0x8, 0x8, 0x1, 0x4, 0x3ff, 0x5, 0x0, 0x4, 0x0, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f00000002c0)={0x61de2b6686066cf8, 0x80, 0x3, 0x6, 0x40, 0xcf, 0x0, 0x3ff, 0x200, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x4, @perf_config_ext={0x401, 0x8}, 0x10000, 0x7ff, 0x7, 0x7, 0x4, 0x3, 0x9, 0x0, 0x6a6, 0x0, 0x8}, r1, 0xd, r2, 0xd) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 287.546311][ T2480] EXT4-fs (loop5): re-mounted. Opts: (null). Quota mode: writeback. [ 287.556998][ T2494] loop1: detected capacity change from 0 to 4096 [ 287.578285][ T2479] loop3: detected capacity change from 0 to 4 05:03:21 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) [ 287.602434][ T2479] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 287.617612][ T2494] EXT4-fs (loop1): Unrecognized mount option "íA" or missing value [ 287.635261][ T2479] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:21 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000ac0)=[{&(0x7f00000001c0)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x420}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc00e0100000000000900803a09000000000006", 0x15, 0x30000}], 0x144400, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) writev(r0, &(0x7f0000000940)=[{&(0x7f00000002c0)="d802a4498d543a8f12dd3b5a48e5887ea665ccbf13fed1065524b08155e432fdcbfea0509e8c90c15ca5da0ea6ead3bc499e309ff8e4c32ddbb1bb607afdf451941d07108cd9d4f7ee460e1ac166f63a9960c786694f5b4fe9c083c776606ecae8f068743e1f2c98ed751d82a9ff8c24711e15f79cb4b3960139b599bc0a25b98a2d432b86face870856ea0bce84f3029f6aba4c28cbd8746fe2488e6395e25b6bd37966305312f34218dc6238c78e0654defa04d5297e22e2dadadf0d537d4e0a263026e079ebde46f9378f6226413f59e63d9639943e336f", 0xd9}, {&(0x7f0000000440)="9470b72bbd0ca2777bd80a147b7e6474152f1971cf5572caad526e9ed83c859adabb882e1b266346a205d01f7071131080aa6df908c4388e5d157522a993fa3cad4509604ed89be1d7ea485faefd85871e5a3b1e083c98ad6562c8db07e2ea3ca65a73b28f8ce7a8b068185ebe84e9471d9f95e456fa20c67fe17e86fa1dbdaa627d2da7c50f845d80528652dd0dc14ad4961ccd85fd050740fa9d9d0fac1285a899ff1dfcdef63a", 0xa8}, {&(0x7f0000000500)="8171b7d37b3cc177a8c0c3329cc4a90876e60c9b4bda73f8cfb838ad23da0ff66cef8675dc90dcb7c8fae0fb8fd364e931d495d62ed97033c0b9e2c8a3c502657d6817b7c3cc8e0fd320dd4e452a99385d8c5787dee3a3c81dd001d43ca1a9e1a5e0c43e7f91707a", 0x68}, {&(0x7f0000000040)="30abdee4c51a183935e2d20ce2c92b25b7da5831a52357d3d9fcea91f44c6130c566a5dfa071423fb48ade52afc96d7d5894ed", 0x33}, {&(0x7f0000000580)="ce016175e51320197ee5eec259758f4da3aa89f551e0c78f282499ae5e1385b88f5c0ec33f6f441066e104ecf40eabc97e3120d6a68c796de6fb43ad1ab97090643577058febfcd30c91ce975b5258db768d8f172e0794e8cb254da393d0bbf943eabab86f7b5648bc2d7dee1f983b43332c174d7830130bc5c8d4bf7698a1f7bdf5275cb1d1ae922f7fbe1772355fdf2c724eeb3cfea6a0b9635439ae00fdd6a7f217802d6594a4", 0xa8}, {&(0x7f0000000640)="6558789866b61db073cef1479a006309d540f92040b377635562d6a667888a4efc077a1e51872852a11573cbe6b24f9a60fef1d80732f49c6da9601236a725298d03d65488fe31b2e75068e0fe729256a5e090bde76a79cf16b0209109b0aa1392282b18f8d688aaf5e69c3ede26205c6a9b63890bcc081e9e256b5197e59aef4600cdb25df515f7e87fc89d6036ca28a6f1c42d1c3a9242a081138681321f8aa1c290dc1a245f71254b994c4baca873a682a3b107d8fc15ae716a259d2564d2b3065bacc2dc2d266112e32ee6d5a3d62d5737f7f9c71c7435ec", 0xda}, {&(0x7f0000000740)="06e58e54a0f41f9b157a9f89dadf7973a1b4dc3f6af8873ceceebc228259cc2b9dbe6b95334b9e0c83b977c0192d839182d50ab072c0f90a1d8998ec344699075e3300cd7f4970064d4fc23dc95ba55e9f36ae280cfde60dd7fc04e27dcc3cc6c7adde6ec5e722ad9c", 0x69}, {&(0x7f00000007c0)="dddd21cb1970c9ee906953bc9fb5f57e755f3b00dcc1d8813e18ee4a3ef257b2b9783e620a84e6b43b0ad0f8bc14083b66607b141256cc3b4e607ea24501ebf0aa07357cbc9d744778a6f10930ce12e27a7314ff90fb30ce8692366f5cee1c21f331ddf3fe8bb377874b39aa1b85d457386cb3ca30", 0x75}, {&(0x7f0000000840)="1b12f155b162f2678e39fa4dc2be1331c78c143c1feaf166d057f394c7da90ca3c0201752be8f31ac1667cfb654993a90e108584d18c7f2f75d6b38505704c3891c2d4feca7b05eb2a16419851eb62fe65ef45e1f73d71e73b70763fbeffc32948ae042c3735d7111d47525fcf33f2766620402dfb74ac730f78edd5dd5e4d215d6cdc137f25e840e1246cf52a1ce78d6ec2bec99fb48850db7181009bf4d5216728cf0ad95029c470bcfa3b64e696187a5f59a2c1a148ba895fe0c6ed5881ed2e595b58210fb61daf31472e64", 0xcd}], 0x9) fallocate(0xffffffffffffffff, 0x7a, 0xaf, 0x3) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 287.659289][ T2513] EXT4-fs warning (device sda1): verify_group_input:132: Cannot add at group 2147483649 (only 16 groups) 05:03:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000058000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:21 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x1) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 287.700751][ T2494] loop1: detected capacity change from 0 to 4096 [ 287.707681][ T2494] EXT4-fs (loop1): Unrecognized mount option "íA" or missing value [ 287.758305][ T2513] EXT4-fs warning (device sda1): verify_group_input:132: Cannot add at group 2147483649 (only 16 groups) [ 287.773762][ T2542] loop3: detected capacity change from 0 to 4 [ 287.802232][ T2542] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled 05:03:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000000340)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x6}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x9}, {&(0x7f0000012600)="ed41000000108000daf4655fdbf4655fdbf4655f0000000000060000000000", 0x1f, 0xff}, {&(0x7f0000000300)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0xff}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="41f68105142d86554a9b31f25c4129ed041deb5fa0529e0d6b79caa4d6e2cca644d639377bc739b7fc37ecb091d8de1d1082f4a438e7e8c023fd3f6000699aee4a0b8dbe98291ba1ce70425af93c850766ca46d95d7554806d67fc172d276e59398db5044669114164a595d652b221a2b2fde216909244b812b56d1a68f2f91d0a9bdf52279f5f31f6ac153af3e96121888725fe4528ffc6261c9d14e9eb283f0040d4aa4cd99d380473e6e4fe05b4aee86cc9a65b5a45b62b9c2fd69f0874006331cf573cdafa871ea16828b689136a478fceebd01b9a5892dc80f5c645bbfbb0fdeb4c16ecb070ef08d256339a4f72841226b0"]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0xfd14) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) splice(r0, &(0x7f00000001c0)=0x7ff, 0xffffffffffffffff, &(0x7f00000002c0)=0x3, 0x2, 0xa) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x10000, 0x40) fallocate(r0, 0x1, 0x0, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = syz_open_dev$ttys(0xc, 0x2, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000380)=0x1000, 0x602) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r1, 0x1, 0x0, 0x28120001) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000002c0)=""/248) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 287.854852][ T2542] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 287.889686][ T2566] loop5: detected capacity change from 0 to 4096 05:03:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0xff2f, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 287.931949][ T2542] loop3: detected capacity change from 0 to 4 [ 287.940665][ T2542] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 287.950376][ T2542] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 287.953217][ T2581] loop1: detected capacity change from 0 to 768 [ 287.961943][ T2566] loop5: detected capacity change from 0 to 4096 05:03:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000068000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 288.016684][ T2581] EXT4-fs (loop1): Unrecognized mount option "Aö-†UJ›1ò\A)íë_ RžkyʤÖâ̦DÖ97{Ç9·ü7ì°‘ØÞ‚ô¤8çèÀ#ý?`" or missing value 05:03:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffff, 0x3}, 0x0, 0x692}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) creat(0x0, 0x8e) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 288.094525][ T2605] loop3: detected capacity change from 0 to 4 [ 288.112527][ T2581] loop1: detected capacity change from 0 to 768 [ 288.120268][ T2605] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 288.130052][ T2605] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x84) lseek(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f00000004c0)='./file0\x00', 0x80, 0x8c) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0), r0) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000440)={&(0x7f00000002c0)={0xf8, r1, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x2c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MON={0x4c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x40}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7c845d4c}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x81}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x752}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xfff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x401}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x6}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x3}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x2}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}]}, @TIPC_NLA_SOCK={0x18, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x80}]}]}, @TIPC_NLA_BEARER={0x10, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffff000}]}]}]}, 0xf8}}, 0x1) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 288.133895][ T2581] EXT4-fs (loop1): Unrecognized mount option "Aö-†UJ›1ò\A)íë_ RžkyʤÖâ̦DÖ97{Ç9·ü7ì°‘ØÞ‚ô¤8çèÀ#ý?`" or missing value [ 288.149167][ T2613] loop5: detected capacity change from 0 to 4096 [ 288.160444][ T2613] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 288.170241][ T2613] EXT4-fs (loop5): group descriptors corrupted! 05:03:22 executing program 5: sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2e9bcb9b714db343}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x14, 0x0, 0x200, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200004068000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 288.212256][ T2605] loop3: detected capacity change from 0 to 4 [ 288.228018][ T2605] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 288.248331][ T2605] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0xff37, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xa0400, 0x128) [ 288.297354][ T2644] loop5: detected capacity change from 0 to 4096 [ 288.308967][ T2644] EXT4-fs (loop5): Unrecognized mount option "À" or missing value [ 288.363863][ T2660] loop1: detected capacity change from 0 to 4096 05:03:22 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000078000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x145b}}, 0x0, 0x0, 0xffffffffffffffff, 0x9) creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000001900)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="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", @ANYRES16, @ANYRESDEC], 0x1d4}, 0x1, 0x0, 0x0, 0x24048000}, 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000001c0)={0x0, 0x1, 0x10000000000023}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000200)={{}, 0x0, 0xe, @inherit={0xb0, &(0x7f0000001e00)=ANY=[@ANYBLOB="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"]}, @name="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"}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000200)={0x0, "b4533b4f5f87ddd4537c3d1ad60c478d"}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000001c0)={{}, 0x0, 0x8, @inherit={0x98, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000a00000000000000000100000000000047000000000000002100000000000000070000738251fc593f8e74169b99e837425632000000000009000000000000000100010000000000fa0100000000000009000000000000000000000000000000020000000000000008000000000000000900000000000000ff0100000000000001000000010000000000008000000000"]}, @devid}) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, &(0x7f00000003c0)={0x0, 0x2, @status={[0x9, 0x1, 0x0, 0xf75, 0x5, 0x4]}, [0x9, 0x0, 0x8fd0, 0x7, 0x80000003, 0x61a6, 0x3, 0x9, 0x10000, 0xb902, 0x5, 0x20, 0x1, 0xff, 0x1ff, 0xfffffffffffffff9, 0x9, 0x5, 0x38a, 0xfff, 0x200, 0x5, 0x1, 0x3, 0x101, 0x6, 0x100, 0xfffffffffffffffa, 0x8af2, 0x0, 0x2, 0x5, 0x0, 0x7, 0x3, 0xd3, 0x3, 0xfffffffffffffffb, 0x7, 0xcac, 0x6, 0x1ff, 0x1, 0x0, 0x9e, 0xffffffff, 0x1ff, 0x7, 0x5, 0xffffffff, 0x8, 0x7ff, 0xce5, 0x200000000, 0x6, 0x5, 0x36, 0x80b7, 0x7, 0x3, 0xd1e8, 0x6, 0x0, 0xffffffffffff0001]}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000800)={0x0, 0x6, 0x40, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000580)={0x0, "fa392b1d033333b45da78086f72c0eca"}) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, &(0x7f0000001740)={0x0, 0x34e0, 0x1, [0x5, 0x80, 0x80, 0xfffffffffffffff9, 0x800], [0x1208, 0x4, 0x3, 0x6, 0x1, 0xeb, 0x3, 0x404, 0x20, 0x3, 0x2, 0x4, 0x7, 0x29d, 0x0, 0x1, 0x9, 0x4, 0x0, 0x7bde, 0x79, 0xe3f, 0x7, 0x3ff, 0x5, 0x8, 0x7, 0x1ff, 0x3, 0x3, 0x4, 0xffff, 0x3, 0x1, 0x7d5, 0x28, 0x7, 0x9, 0x8, 0x7, 0x56a, 0x10001, 0x80000001, 0x400, 0x5, 0x0, 0x7, 0x100000001, 0x7, 0x36c2, 0x8, 0x80000000, 0x67c00000000, 0x10001, 0x4, 0x8, 0x3, 0x100000001, 0x6dd4, 0x0, 0x0, 0xc5a4, 0x7a, 0x1, 0x6, 0x1, 0x40, 0x7fff, 0x800, 0x401, 0x6, 0xffffffffffffffc0, 0x175e, 0x7, 0x2, 0x3, 0x0, 0xfffffffffffff327, 0x3, 0x7, 0x7f, 0xab, 0xf74, 0x3, 0x3, 0x4, 0x2, 0x0, 0x400000000000, 0xffffffffffffff81, 0x81, 0x7, 0x0, 0x7, 0x7fff, 0x7ff8, 0x7, 0x9, 0xfffffffffffffff9, 0x9, 0x8000, 0x10, 0xfe, 0x5, 0xdeb, 0x80, 0x100000001, 0x71, 0x1f, 0x8, 0x6, 0x401, 0x4, 0x3, 0x40, 0x9, 0x4, 0x7ee5, 0x0, 0xfffffffffffff801, 0x4]}) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0xff3f, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4de}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x411, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3ff000, 0x5}, 0x4010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r1, 0x0, 0xfd14) fallocate(r1, 0x1, 0x0, 0x28120001) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000000c0)=0xffffffffffffffff) unlinkat(r1, &(0x7f0000000040)='./file0\x00', 0x200) getsockname(r1, &(0x7f0000000480)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000500)=0x80) r3 = syz_open_dev$char_usb(0xc, 0xb4, 0x2) sendfile(r2, r3, &(0x7f0000000540)=0x8, 0xb4b0) r4 = socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) llistxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)=""/207, 0xcf) ioctl$F2FS_IOC_GET_FEATURES(r4, 0x8004f50c, &(0x7f0000000440)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 288.720441][ T2701] loop1: detected capacity change from 0 to 4096 [ 288.732610][ T2701] EXT4-fs (loop1): unsupported descriptor size 0 [ 288.740629][ T2700] loop5: detected capacity change from 0 to 4096 [ 288.747150][ T2698] loop3: detected capacity change from 0 to 4 [ 288.793585][ T2698] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 288.806568][ T2698] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(r0, &(0x7f00000000c0), 0x9) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 288.846339][ T2701] loop1: detected capacity change from 0 to 4096 [ 288.868989][ T2700] loop5: detected capacity change from 0 to 4096 [ 288.875513][ T2698] loop3: detected capacity change from 0 to 4 [ 288.886844][ T2701] EXT4-fs (loop1): Unrecognized mount option "./file0" or missing value 05:03:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0xff47, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000098000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 288.886870][ T2700] EXT4-fs (loop5): Unrecognized mount option "ÿÿÿÿ" or missing value [ 288.903640][ T2698] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 288.930384][ T2698] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x5, 0x6, 0x0, 0x0, 0x0, 0x2258, 0x420, 0x4, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x4, 0x3}, 0xb440, 0x8e, 0x20, 0x5, 0x1, 0x1, 0x49c7, 0x0, 0x4, 0x0, 0xfffffffffffffffb}, 0x0, 0x7, 0xffffffffffffffff, 0x2) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = creat(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r2 = dup2(r1, r0) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r2, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x28, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x6, 0x45}}}}}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x4081) 05:03:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1ffffd, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="fd410000001000655f00000000000004008000000000000800050000000af30100040000000000000000000000010000001000"/61, 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) open(&(0x7f0000000180)='./file0\x00', 0x42101, 0x124) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='wchan\x00') ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f00000002c0)={0x2, 0x8000, 0x5, {0x2, 0x7f}, 0x4, 0x800}) umount2(&(0x7f00000000c0)='./file0\x00', 0xf) [ 289.005185][ T2761] loop1: detected capacity change from 0 to 4096 [ 289.077135][ T2770] loop5: detected capacity change from 0 to 4096 [ 289.134936][ T2788] loop3: detected capacity change from 0 to 4 [ 289.144956][ T2788] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 289.155586][ T2788] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 289.210895][ T2770] loop5: detected capacity change from 0 to 4096 [ 289.217848][ T2770] EXT4-fs (loop5): Unrecognized mount option "À" or missing value [ 289.219426][ T2788] loop3: detected capacity change from 0 to 4 [ 289.238840][ T2788] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 289.251145][ T2788] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:23 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x34, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) mount$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0), 0x240081, &(0x7f00000002c0)={[{@huge_never}], [{@dont_measure}]}) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000}, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0x5, 0x81, 0x0, 0x5, 0x40000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x100, 0x2, @perf_bp={&(0x7f0000000480), 0x5}, 0x2, 0x101, 0x7, 0x8, 0x7ff, 0x34f3, 0x4, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0x1, r1, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r2, 0x1, 0x0, 0x28120001) sendmsg$IPSET_CMD_SAVE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x40, 0x8, 0x6, 0x5, 0x0, 0x0, {0xa, 0x0, 0x7}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0), &(0x7f00000002c0)={'L-', 0x2}, 0x16, 0x3) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0xff4f, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), r0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000440)={0x248, r1, 0x8, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x50, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x401}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_BEARER={0x2c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xadd}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}]}, @TIPC_NLA_NET={0x18, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x101}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xbe}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x40}]}, @TIPC_NLA_NET={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xe97}]}, @TIPC_NLA_NODE={0x140, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x44, 0x4, {'gcm(aes)\x00', 0x1c, "a08cd607aec6b750df6c5f8ac0e5f2ad19b856824494b08a310d7e32"}}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ID={0x13, 0x3, "94433eb42d327d53ee8106906260ef"}, @TIPC_NLA_NODE_KEY={0x40, 0x4, {'gcm(aes)\x00', 0x18, "883fbc0b06eda3e7532b342ccad78ccf43249305fefbcfe9"}}, @TIPC_NLA_NODE_KEY={0x4b, 0x4, {'gcm(aes)\x00', 0x23, "2fc39755a5402ea6bcc8eb96a11b18f36e8aec4340413d8be8190efca0327fef90d2b4"}}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x49, 0x4, {'gcm(aes)\x00', 0x21, "5ccfb43c9124eb5b19d3cf5c9937fef41ae2469ccd14569a3b31e7e0ffbdbb76e8"}}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x4}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x20ad}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK={0x1c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40000}, 0x40001) creat(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000a8000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 289.602766][ T2833] loop1: detected capacity change from 0 to 4096 [ 289.645397][ T2837] loop5: detected capacity change from 0 to 4096 [ 289.654201][ T2836] loop3: detected capacity change from 0 to 4 [ 289.681393][ T2836] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled 05:03:23 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r1, 0x0, 0xfd14) fallocate(r1, 0x1, 0x0, 0x28120001) unlinkat(r1, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x34, 0x0, 0xa61818f97f370fd9, 0x70bd2b, 0x25dfdbfe, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @private=0xa010102}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e21}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) futimesat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={{0x0, 0xea60}, {0x0, 0x2710}}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg(r3, &(0x7f0000000800)=[{{&(0x7f00000002c0)=@vsock, 0x80, &(0x7f0000000640)=[{&(0x7f0000000340)="3c27ce3134ca63710255171ede90014986c3cddcc5c1f23dd1c45a2b6c10f6c40c73320f15f7d66033f959d12cb43b7b777d72b89dfddafd9b6b21e708ebf000c5108b1ca40c3bf85bcd1f6d246aa3e87eb31975082fe261f488b4678d7e75e49b623bb9d130af5601d94196222a", 0x6e}, {&(0x7f0000000440)="e502f701900d96d7820bff8523cf5a8af1ecb26bb2281ba964c54a6707e160470dbf345efbc1b1ad680e71cc095c22c2416f249788d8e04a31c5121c7dda5352137c37aeb6043074c57964dfe0a8efbbae5f64b8f1e32221e777b539aab67ee5a6bc95af5f68cdd1321630efd6aa18212d9c8385294cd60a4782f85d265106729d40ad00263627c37a3eeb93530a1c327488cdf250d8c896dba46536904dbe646c15601d5d606168a5a986a91e6366e955", 0xb1}, {&(0x7f0000000500)="9c85fde8c4af1b86eb91c688fa87943493814f1f81c9f4fcfdbbf34593a2d07579237a56bbe5a32e68c53c5911f8efaf89c27794f87f21a908259cd438a98e9a4575b85aa1d4570069e005c2f59c9f22c7f7c7949b51d9fbe94198c0d8dcd43c48df82ce16d1f7bb00ab815d14447a04c3ded48302165ac0a798fcd4c807284428e3914d3ccbdb0e39e1e1804965f83a3731b071679a4ae8842ae85d387f9f4383c6631557c066494df7ce935da7c47a904125ea16901f1aa80f9bb0b0046e", 0xbf}, {&(0x7f00000005c0)="f535e632b612a85407aa48b23d319d16a011946b86a069b8df6eccf95873b3b6b1a7b445998190f041f335d14531506e52e7d5fed270d31069fdc2c6ba7b24b1163fc070685976b610d12b6ee71240e59450f45fc8433dbc0d6cda96853d23dd5f79e31c0d342374273d35bf4599687cdcdbc90ac70a53d7", 0x78}], 0x4, &(0x7f0000000680)}}, {{&(0x7f00000006c0)=@can, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000740)="b2aa52ab5fa2146f4f8c83477cb5cd4167f62dec78f405b197f8282ac0ee6d7d8d3765b916329179d217467beeeffedae2ab017191e830e8873fbc3aa2a2703bc4649016b0ee3d0f58268ad81a01a3585a841d7d43bb033628e98d338ab3", 0x5e}], 0x1}}], 0x2, 0x41) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000001a40), 0x100, 0x0) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f0000001a80)) 05:03:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) dup3(r0, r0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r1, 0x1, 0x0, 0x0) unlinkat(r1, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 289.697812][ T2836] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:23 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) chroot(&(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff}, 0x80}, 0x0, 0x0, r0, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.swap.current\x00', 0x0, 0x0) creat(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x0) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r1, 0x1, 0x2000000009, 0x28120001) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) umount2(&(0x7f0000000180)='./file0\x00', 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) [ 289.787995][ T2836] loop3: detected capacity change from 0 to 4 [ 289.800817][ T2836] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 289.820523][ T2887] loop1: detected capacity change from 0 to 4096 05:03:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0xff57, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 289.832890][ T2836] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 289.851479][ T2892] loop5: detected capacity change from 0 to 4096 05:03:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000b8000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x1000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$BTRFS_IOC_INO_PATHS(r1, 0xc0389423, &(0x7f00000001c0)={0x9, 0x38, [0x3, 0x0, 0x9, 0xb1e], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f00000002c0)='freezer.state\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 289.913573][ T2892] EXT4-fs (loop5): re-mounted. Opts: (null). Quota mode: writeback. [ 290.022776][ T2927] loop3: detected capacity change from 0 to 4 [ 290.023569][ T2932] loop1: detected capacity change from 0 to 4096 [ 290.033367][ T2927] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 290.069842][ T2927] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 290.121016][ T2927] loop3: detected capacity change from 0 to 4 [ 290.132563][ T2927] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 290.144337][ T2927] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:24 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x15d, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r1, 0x1, 0x0, 0x28120001) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f00000000c0)) 05:03:24 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) chroot(&(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff}, 0x80}, 0x0, 0x0, r0, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.swap.current\x00', 0x0, 0x0) creat(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x0) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r1, 0x1, 0x2000000009, 0x28120001) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) umount2(&(0x7f0000000180)='./file0\x00', 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) 05:03:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0xff5f, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x80000000, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000c8000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 290.491314][ T2963] loop3: detected capacity change from 0 to 4 [ 290.504992][ T2962] loop5: detected capacity change from 0 to 4096 [ 290.526725][ T2963] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 290.541938][ T2968] loop1: detected capacity change from 0 to 4096 [ 290.543826][ T2963] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 290.611298][ T2963] loop3: detected capacity change from 0 to 4 [ 290.628299][ T2963] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 290.638129][ T2963] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x200001, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="0293cf2f88f22361c6fd63d791c71fb5ce2dc4a168d1b4e85daa4949c06de367f98ab2e9e863578ffed983d3bb6b9915afa5e92a5b1bd7c24a927e2cd08b31698d861b3beaa2fddf5c176e996e81fe63a4c654b1e125ed2bef21c1eae3589c150b4af032edd61297b5e105f044b75a000d533008dcb24382d2befd9f96557cd3ef2d0b3e7c5b32d8db7eec1e801c08b4197f22c2ab534213c618a523c7f526a9987790033f3bcb00000000", 0xab, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x3001, &(0x7f00000001c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='\\\'.*\x00') r1 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r1, 0x1, 0x0, 0x0) unlinkat(r1, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f00000002c0)="80daf4655fdaf465351b22833a96645d0bffcdfeb8ae5f000000000000ba863070000010000800000000b60af309000000642b000000c8e56063ecdd29d1be30390000000000000002f1ffff2f000000000000000000", 0x56, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x0, 0x28120001) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xffffffff) r1 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r1, 0x0, 0xfd14) fallocate(r1, 0x1, 0x0, 0x28120001) unlinkat(r1, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 290.670302][ T2962] EXT4-fs (loop5): re-mounted. Opts: (null). Quota mode: writeback. 05:03:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000030c8000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x4) [ 290.722866][ T2968] loop1: detected capacity change from 0 to 4096 [ 290.736048][ T2968] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 290.781051][ T3019] loop3: detected capacity change from 0 to 4 [ 290.788441][ T3022] loop5: detected capacity change from 0 to 4096 [ 290.796172][ T3019] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled 05:03:24 executing program 4: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000b56cc94ef83ed87d12935d8f00000000000001000000000100000b00000000046c0bdf8613308971637ceebd6af7013ece01dcc70e33f29a20532b8e3866ec0632371c05766c0a8da63e4583052547889d4639e09e033aaaadd67c8275ab1c62b2980892d784d0f94a16ad636a6864a96e0c352c5613e4220bd2365e10974fc527e72327db951287c02820bbe411a5f198b2394540a6952dad51b96fe4c98a9e7e413168f3134c11473dbc", 0xf1, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)='\v', 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x43fd}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESOCT, @ANYRESDEC=r0]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r1, 0x1, 0x0, 0x0) unlinkat(r1, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 290.832465][ T3019] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 290.842733][ T3035] loop1: detected capacity change from 0 to 4096 [ 290.843121][ T3022] EXT4-fs error (device loop5): ext4_quota_enable:6432: comm syz-executor.5: Bad quota inode # 3 [ 290.859717][ T3022] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 05:03:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x3fc}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x57e}, {&(0x7f0000000080)="03", 0x1, 0x643}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000440)="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", 0x117, 0x5}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 290.907108][ T3019] loop3: detected capacity change from 0 to 4 [ 290.930506][ T3019] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 290.953847][ T3022] EXT4-fs (loop5): mount failed [ 290.970863][ T3019] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 291.032816][ T3073] loop1: detected capacity change from 0 to 4096 [ 291.041094][ T3073] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 291.083582][ T3073] loop1: detected capacity change from 0 to 4096 [ 291.091489][ T3073] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 05:03:25 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1f4, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0xff67, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000d8000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x4cc040, 0x1) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000140)=0x1) readv(r1, &(0x7f0000000040)=[{0x0}, {&(0x7f00000004c0)=""/231, 0xe7}], 0x2) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000440)={0x0, 0x20000006, 0x0, 0x0, 0xd}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 291.376013][ T3101] loop5: detected capacity change from 0 to 4096 [ 291.382641][ T3103] loop3: detected capacity change from 0 to 4 [ 291.383633][ T3104] loop1: detected capacity change from 0 to 4096 [ 291.415965][ T3103] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled 05:03:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000380)={'syztnl2\x00', &(0x7f0000000440)={'syztnl2\x00', 0x0, 0x2f, 0xe3, 0xfb, 0x1, 0x18, @ipv4={'\x00', '\xff\xff', @remote}, @local, 0x1, 0x20, 0xffffffff, 0x7}}) sendmsg$inet(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000000c0)={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f00000001c0)=[{&(0x7f00000002c0)="657414eebb997b5e7cacfcf85bebb74c9df011b451c428b1240181445d9798f8add8973945c1a0daf18bfb5782835c48bfba288d26b46c6774b7658e82375f6f9d4185009afa216058d63d80e6f3b27517a6146666412db7d82c104443e6a20a0c886ce06fb9cd69c49cb0dae010beaed3b67d58ce7577a07d812a604ad8a3c9ca269fd0f357b7db27e7d08a70", 0x8d}], 0x1, &(0x7f0000000900)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r0, @loopback, @broadcast}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast}}}, @ip_retopts={{0xbc, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x44, 0x1f, 0x3, 0x7, [{@empty, 0x6}, {@rand_addr=0x64010102, 0x2}, {@multicast1, 0x8}, {@empty, 0x6}, {@local, 0x4}, {@multicast2, 0x80}, {@multicast1, 0x8}, {@local}]}, @generic={0x86, 0xb, "36f311976f3238a654"}, @ssrr={0x89, 0x2b, 0xbd, [@rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, @rand_addr=0x64010102, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, @private=0xa010100, @multicast2, @multicast2, @multicast1]}, @timestamp={0x44, 0x10, 0xff, 0x0, 0x1, [0x15b, 0xffff, 0x8]}, @end, @ra={0x94, 0x4, 0x1}, @noop, @lsrr={0x83, 0x1b, 0xbc, [@loopback, @remote, @loopback, @broadcast, @local, @loopback]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_retopts={{0x64, 0x0, 0x7, {[@noop, @timestamp={0x44, 0x2c, 0x8a, 0x0, 0xf, [0x53d8bf18, 0x435, 0x2, 0x7, 0x200, 0xcc8, 0x475c, 0x6, 0x1c0, 0x0]}, @ra={0x94, 0x4, 0x1}, @ssrr={0x89, 0x1f, 0x9d, [@broadcast, @broadcast, @private=0xa010101, @loopback, @multicast2, @dev={0xac, 0x14, 0x14, 0xd}, @remote]}, @timestamp_addr={0x44, 0x4, 0xc6, 0x1, 0xb}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x80000000}}, @ip_ttl={{0x14, 0x0, 0x2, 0x9b}}, @ip_retopts={{0xdc, 0x0, 0x7, {[@noop, @rr={0x7, 0x13, 0x46, [@private=0xa010102, @remote, @empty, @loopback]}, @cipso={0x86, 0x62, 0x3, [{0x7, 0x12, "7ff10193801bf3258313cdbb167cc4a2"}, {0x3, 0x11, "daab01eb42c13a32052655e2cd498d"}, {0x0, 0xb, "dc2ce8529caa81ad68"}, {0x5, 0xf, "c0f16a21342f78181c7da75567"}, {0x7, 0x4, "3287"}, {0x0, 0x7, "cd98dc1d5d"}, {0x1, 0x2}, {0x7, 0x12, "e9b52503523f9d5df123fb772b53298b"}]}, @ssrr={0x89, 0x7, 0x17, [@remote]}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x20, 0x2, [{0x1, 0xd, "891bc8024403dd08f14d6f"}, {0x2, 0xd, "dba5fc0000000000000000"}]}, @timestamp_addr={0x44, 0x24, 0x2e, 0x1, 0x6, [{@multicast2, 0x1}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3}, {@private=0xa010102, 0xfffffff8}, {@private=0xa010102, 0x60}]}, @ra={0x94, 0x4}]}}}], 0x2c0}, 0xc000000) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x401}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r1, 0x1, 0x0, 0x0) unlinkat(r1, &(0x7f0000000040)='./file0\x00', 0x200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg(r2, &(0x7f0000000600)=[{{&(0x7f00000004c0)=@xdp={0x2c, 0x4, r0, 0xa}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000540)="bb1811d14ab2ed391d81fd75c68fea470ee546de32323c5e1718ef9b91f80d3370fcdd35cb8be1a7676dc5cdf58e7eb7712c30b40c50b3f95ca9f9b00bd68095ffaf91383fdace90293047fc4b7899c70a99f54374315beac8f7051779ee", 0x5e}], 0x1}}], 0x1, 0x40008c0) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 291.466121][ T3103] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r1, 0x1, 0x0, 0x28120001) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0xc, 0x4000010, r1, 0x52d9f000) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 291.523533][ T3103] loop3: detected capacity change from 0 to 4 [ 291.541220][ T3103] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 291.563322][ T3103] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000e8000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0xff6f, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 291.646308][ T3166] loop5: detected capacity change from 0 to 4096 [ 291.674159][ T3177] loop3: detected capacity change from 0 to 4 05:03:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 291.696232][ T3177] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 291.720624][ T3177] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 291.789849][ T3177] loop3: detected capacity change from 0 to 4 [ 291.800681][ T3201] loop5: detected capacity change from 0 to 4096 [ 291.800705][ T3177] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 291.816800][ T3177] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:26 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x241, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x4fff, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:26 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r1, 0x1, 0x0, 0x0) unlinkat(r1, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) fcntl$setpipe(r0, 0x407, 0x1) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000f8000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) 05:03:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x21000, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 292.269724][ T3231] loop3: detected capacity change from 0 to 4 [ 292.281767][ T3231] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 292.291626][ T3231] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 292.294888][ T3232] loop1: detected capacity change from 0 to 4096 [ 292.308333][ T3236] loop5: detected capacity change from 0 to 4096 05:03:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200004108000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 292.329766][ T3232] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 292.339187][ T3232] EXT4-fs (loop1): group descriptors corrupted! 05:03:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) [ 292.386772][ T3259] loop3: detected capacity change from 0 to 4 [ 292.437537][ T3259] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 292.459537][ T3259] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:26 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0xe0}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) r1 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r2, 0x1, 0x0, 0x0) unlinkat(r2, &(0x7f0000000040)='./file0\x00', 0x200) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000016c0)=ANY=[@ANYRESHEX, @ANYRES16, @ANYRESDEC, @ANYBLOB="e4b3fcdfaf28d2f54df080980ecba931899b0008000000000000074dae8564120ea7471c8734c4922298574f4a6257e44b155e19c37e446191e681261f836eaf0cef84dce214261ca313fcce6833276cb1e4ba13668bbfeb3b5024ed222970f9e1ddabb042e3695f67e387c26fa634b4d9bfda45b262ff431c6d56785cf7fed495c7f6bc172da0e3349c47edadc95de0995d0500000049c46e0d364800bdfa1bac1bbd842f1dbd4cf73f2a5311fa106c0c61b59bfa82276f2a1aadff1ad04e31a1ad41059976b940f5452f93e868863e967bd1ffb3e15179e8435815ff0fd89ad8e4342c79b161531cb1265a507536be04f68db7f3f5f5a9160f73f4e398a6d9124ba0601046b3e86acc21361d878e6571e9e04a45c29f36f02db5053b317c831eed0d97d8669da67e98acecb5cff9b219be9943a3fa223e8a66308c31da0ebaf1f7c9694bcf90738405808086e92412ad5268cecd8a4fcabeaa8a9e3899b8ebd04dee8f6c027b98e8d6ded5680c8f3f304ba1ffba8e13958fa14635aa1f0e148f76c71e5947e6b6a0c3a0c13eb5ea7b1093b689cd698e159504413068d04cb0143f702196774cef3e6a002386196b72c3629b8413448c34ac87161c7a86d108826578208ad5b5cfe76db9a141cc1e971ba511e70c061634f475947a200dfee7b012cff1d2c62d708e4f665161f2d9afab092f92d5b706d7e221c9b2add66e0b13f35b070b"], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000001900)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000001bc0)=ANY=[@ANYRESOCT=r1, @ANYRES16, @ANYRESDEC], 0x1d4}, 0x1, 0x0, 0x0, 0x24048000}, 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000001c0)={0x0, 0x1, 0x20}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000200)={{}, 0x0, 0xe, @unused=[0x0, 0xfffffffffffeffff, 0xffffffffffff8af2, 0x4], @devid}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000200)={0x0, "b4533b4f5f87ddd4537c3d1ad60c478d"}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000001c0)={{}, 0x0, 0x8, @inherit={0x98, &(0x7f0000001580)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, &(0x7f00000003c0)={0x0, 0x2, @start={0x0, 0x0, "d4bbe5b48071f495c639742786a726a0dce6ab122b00a60909f79974d9602d284b6b22b797d9220dfea8e3171e0f71ccf9f903c3865c5b7c6c77e546d4a1e17eecaf58c6dc0d50ad549f2cc9307e3aefc6b2c15d13a936d801c58d82b3c93f73285aaff86eeb498859245b96e2d07aed42ff0795850bd67e40cebe3c74b6d4933e9b836f6f16293e66d8249b976807ae38316b9103378ec37124d871dbf4a005358354489c7e28b591ffbc22d9e9e15cfce38f69f848081709b921c3f6b70a1d4afc1435e20d33ed830274b4eba48d2f2c098e10ea3ac3162ac1365ec86b82ff5559dcdebf66178c3bc512c5dbf2b5765f298185027a15f1d20bbbba0f9d3ba3fd8c1fd3e5199b03cf0f3fab97d1cc8273099e8f0875ccd97cd1a58ddb01322543867a932448aaa7186f17bf44d8dfd897ce7fbd5a47c8b5b63ab8966da0275c6b5ef344d7ae2d729acc6079e4f796bb73874377838657fb71964fe51aa3d6631876178426c1d5862469a7bd5c2f95ce157e7c3938ac5c43e4e6c2c2985da086de66d547abd7f4e6c5e574af4ffef639bdc98f7d64ab7e31c84717aa713868347a6df377589ffbab3970997f4bbe876b3ce1c8f2f27415392a0bd5f2a4408ffb161a9ea812eac9116ea3e94b2be425513e286af56205ba5a1f924a5beefdf7ce1328bda85a0493edcd976f7c5d35ab00c0a55e3e86511b35b361a93feb6d03202c36298cea5def5a77993fd33cc4d317d628e41ff2835627fd5e209b0fcba52343feb60c32281d3e912704c5b323ec1eaf9f0cf110e71dcc3430ab68af169f3052e8b7414554dbda1d1cdf3928c4144c52f6961db46d3c73e12aef21b8cac56a76593cc4e8771c1e34e6bed68c4043b349c4884385cdcbdf7ebedd801e8a58e03a373514135aba5aebc8fde1d10929997fe12a5ba40654605eaa2b4951317de3e816906b8ab458d3d1f5114829ac282ee73cca06218e78fc70c6f34c498b32afc6ebd936dd3cfd6f5d85a1b8c21f2dd2fb1db023b4e86909df2ce05d01ff7764edc297d90c8c442133432ee2c3f6ab30007ebac1dfe8c80511a5084b71fd3be18414edfabdae06ac3570848229cdca0003bc9f21d4f274f813995c358a47e21e13ea5ec62d2571da2a72120b3f9dfbd22cd20ea046f53f4800c885cc31362341788b7dcb582873599246f6865a648cfe59d36eb9bb5a46aee6d9d7eed7646712d972c97c3750700c8321d686f2844c397414e8443ab55199efd97399d7be658739c357ad8b2f74e44e957d2158fd63efafb9f5905cdc107195a45f6b81f96595f873250209d278ee2dbf240f40e8ecf16b2c8e13f2e2afca6921db2bebff0f40a5fec1f1c8f7159c651883507cde5a482d432512e33a80e25520483a1562a60c38d0655bfba8ce2eee54dc2f5bf839352e7c3ffc858abd0c684aee9f1b2b2a269d", "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"}, [0x9, 0x0, 0x8fd0, 0x7, 0x80000001, 0x61a6, 0x3, 0x9, 0x10000, 0xb902, 0x5, 0x20, 0x1, 0xff, 0x1ff, 0xfffffffffffffff9, 0x9, 0x5, 0x38a, 0xfff, 0x200, 0x5, 0x1, 0x3, 0x101, 0x6, 0x101, 0xfffffffffffffffa, 0x8af2, 0x0, 0x2, 0x5, 0x0, 0x7, 0x3, 0xd3, 0x3, 0xfffffffffffffffb, 0x7, 0xcac, 0x6, 0x1ff, 0x1, 0x0, 0x9e, 0xffffffff, 0x1ff, 0x7, 0x5, 0xffffffff, 0x8, 0x7ff, 0xce5, 0x200000000, 0x6, 0x5, 0x36, 0x80b7, 0x7, 0x3, 0xd1e8, 0x6, 0x0, 0xffffffffffff0001]}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000800)={0x0, 0x6, 0x40, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000580)={0x0, "fa392b1d033333b45da78086f72c0eca"}) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000440)={{r0}, 0x0, 0x2, @unused=[0x93, 0x2, 0x3, 0x3], @devid}) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x2) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:26 executing program 1: arch_prctl$ARCH_GET_CPUID(0x1011) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = creat(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) ioctl$int_in(r0, 0x5421, &(0x7f00000001c0)=0xfffffffffffffff9) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$CHAR_RAW_IOOPT(r1, 0x1279, &(0x7f0000000040)) [ 292.504863][ T3259] loop3: detected capacity change from 0 to 4 [ 292.511655][ T3259] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 292.524615][ T3259] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 292.537617][ T3279] loop5: detected capacity change from 0 to 4096 05:03:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200020108000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 292.638425][ T3307] loop1: detected capacity change from 0 to 4096 [ 292.643743][ T3310] loop3: detected capacity change from 0 to 4 [ 292.652122][ T3310] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 292.662332][ T3310] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 292.705779][ T3310] loop3: detected capacity change from 0 to 4 [ 292.712301][ T3310] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 292.723252][ T3310] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 292.779729][ T3339] loop5: detected capacity change from 0 to 4096 05:03:27 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x300, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:27 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) open_by_handle_at(r0, &(0x7f0000000140)=@FILEID_INO32_GEN={0x8, 0x1, {0x28, 0xd06c4f82}}, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) fallocate(r1, 0x1, 0x0, 0x0) unlinkat(r1, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000002c0), 0x105002, 0x0) r2 = accept4(r1, &(0x7f0000000300)=@pppoe, &(0x7f0000000380)=0x80, 0x40800) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="2321202e2f66696c65302073656375726974792e6361706162696c697479000a270d49746693d5e98420f29b239a452e4d4e225c0dc2f90efa5108e4ddb6c0a9e853a7c2310d9f445b979cc765ee035a715cedc67dd2c60199cb362b2f986dd4f33f94e08d60696ae2cbcf0d478edf870d465b30ff6fe2449ba9f3d163d790d884490031974988ca767dac26b566ec2e8c8c7ce16632f6f3a6b51906069c2e5f7cb591ee43b8177896"], 0xa9) creat(&(0x7f00000000c0)='./file0\x00', 0x120) lseek(0xffffffffffffffff, 0x0, 0x0) preadv(r2, &(0x7f00000008c0)=[{&(0x7f0000000500)=""/209, 0xd1}, {&(0x7f0000000600)=""/214, 0xd6}, {&(0x7f0000000700)=""/186, 0xba}, {&(0x7f00000007c0)=""/244, 0xf4}], 0x4, 0x9, 0xed) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r3, &(0x7f00000001c0)='./file0\x00', 0x50) 05:03:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000118000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x217ff, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 293.209380][ T3361] loop1: detected capacity change from 0 to 4096 [ 293.247050][ T3375] loop5: detected capacity change from 0 to 4096 05:03:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r0, 0x21, 0x0, 0x1c28) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 293.259462][ T3370] loop3: detected capacity change from 0 to 4 [ 293.278784][ T3370] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled 05:03:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000002c0), 0x105002, 0x0) r2 = accept4(r1, &(0x7f0000000300)=@pppoe, &(0x7f0000000380)=0x80, 0x40800) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="2321202e2f66696c65302073656375726974792e6361706162696c697479000a270d49746693d5e98420f29b239a452e4d4e225c0dc2f90efa5108e4ddb6c0a9e853a7c2310d9f445b979cc765ee035a715cedc67dd2c60199cb362b2f986dd4f33f94e08d60696ae2cbcf0d478edf870d465b30ff6fe2449ba9f3d163d790d884490031974988ca767dac26b566ec2e8c8c7ce16632f6f3a6b51906069c2e5f7cb591ee43b8177896"], 0xa9) creat(&(0x7f00000000c0)='./file0\x00', 0x120) lseek(0xffffffffffffffff, 0x0, 0x0) preadv(r2, &(0x7f00000008c0)=[{&(0x7f0000000500)=""/209, 0xd1}, {&(0x7f0000000600)=""/214, 0xd6}, {&(0x7f0000000700)=""/186, 0xba}, {&(0x7f00000007c0)=""/244, 0xf4}], 0x4, 0x9, 0xed) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r3, &(0x7f00000001c0)='./file0\x00', 0x50) 05:03:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r0, 0x21, 0x0, 0x1c28) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 293.318632][ T3370] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x21800, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 293.396166][ T3410] loop1: detected capacity change from 0 to 4096 [ 293.420208][ T3370] loop3: detected capacity change from 0 to 4 [ 293.429520][ T3421] loop5: detected capacity change from 0 to 4096 [ 293.434107][ T3370] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled 05:03:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r0, 0x21, 0x0, 0x1c28) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 293.447342][ T3370] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:27 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x3e8, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000002c0), 0x105002, 0x0) r2 = accept4(r1, &(0x7f0000000300)=@pppoe, &(0x7f0000000380)=0x80, 0x40800) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="2321202e2f66696c65302073656375726974792e6361706162696c697479000a270d49746693d5e98420f29b239a452e4d4e225c0dc2f90efa5108e4ddb6c0a9e853a7c2310d9f445b979cc765ee035a715cedc67dd2c60199cb362b2f986dd4f33f94e08d60696ae2cbcf0d478edf870d465b30ff6fe2449ba9f3d163d790d884490031974988ca767dac26b566ec2e8c8c7ce16632f6f3a6b51906069c2e5f7cb591ee43b8177896"], 0xa9) creat(&(0x7f00000000c0)='./file0\x00', 0x120) lseek(0xffffffffffffffff, 0x0, 0x0) preadv(r2, &(0x7f00000008c0)=[{&(0x7f0000000500)=""/209, 0xd1}, {&(0x7f0000000600)=""/214, 0xd6}, {&(0x7f0000000700)=""/186, 0xba}, {&(0x7f00000007c0)=""/244, 0xf4}], 0x4, 0x9, 0xed) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r3, &(0x7f00000001c0)='./file0\x00', 0x50) 05:03:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0xfd14) fallocate(r0, 0x1, 0x0, 0x28120001) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000128000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:27 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) r1 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) chdir(&(0x7f0000000040)='./file0\x00') lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) write$binfmt_misc(r1, &(0x7f00000002c0)={'syz1', "23db6938efdfaaceb8cbd2bb49b27e3bbcdd8b4f370df5bc1d6e0f7e449c72644ae63f701ce51b9111773e9f203980d914492068681d8890a8ae7061ba41e18f3964800db331e970128390799a19a9249273337d53"}, 0x59) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) write$binfmt_script(r0, &(0x7f00000000c0)={'#! ', './file0', [{}, {}], 0xa, "ceb49c0a00d4fe88f739dd9559ec"}, 0x1b) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) faccessat(r0, &(0x7f0000000440)='./bus\x00', 0x1) r2 = syz_open_dev$ptys(0xc, 0x3, 0x0) sendfile(r0, r2, &(0x7f0000000340)=0x9, 0x5b81252e) truncate(&(0x7f00000001c0)='./bus\x00', 0x3) copy_file_range(r2, 0x0, r1, &(0x7f0000000380)=0x9, 0x5, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000004c0)={0x33, @local, 0x4e23, 0x4, 'dh\x00', 0x20, 0x8, 0x8}, 0x2c) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x21810, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:28 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000480)=@filename='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='rpc_pipefs\x00', 0x84010, &(0x7f0000000540)='ext4\x00') write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r1, 0x1, 0x0, 0x0) unlinkat(r1, &(0x7f0000000040)='./file0\x00', 0x200) chown(&(0x7f00000001c0)='./file0\x00', 0xee01, 0xee01) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x20200, 0x0) open_tree(r0, &(0x7f0000000440)='./file0\x00', 0x88801) getdents64(r2, &(0x7f00000002c0)=""/239, 0xef) [ 294.100592][ T3462] loop3: detected capacity change from 0 to 4 [ 294.111721][ T3462] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 294.116020][ T3461] loop5: detected capacity change from 0 to 4096 [ 294.121458][ T3462] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 294.127559][ T3463] loop1: detected capacity change from 0 to 4096 05:03:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0xfd14) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:28 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000480)=@filename='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='rpc_pipefs\x00', 0x84010, &(0x7f0000000540)='ext4\x00') write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r1, 0x1, 0x0, 0x0) unlinkat(r1, &(0x7f0000000040)='./file0\x00', 0x200) chown(&(0x7f00000001c0)='./file0\x00', 0xee01, 0xee01) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x20200, 0x0) open_tree(r0, &(0x7f0000000440)='./file0\x00', 0x88801) getdents64(r2, &(0x7f00000002c0)=""/239, 0xef) [ 294.189601][ T3462] loop3: detected capacity change from 0 to 4 [ 294.197438][ T3462] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 294.208551][ T3462] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200067138000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:28 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x3f, 0x7, 0x4, 0xa0, 0x0, 0x9, 0x1, 0x5, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x97b9, 0x1, @perf_config_ext={0x7340, 0xfffffffffffffff9}, 0x41c68, 0x3, 0x4, 0x8, 0x2cfc, 0x5e, 0x0, 0x0, 0x1}, 0x0, 0x2, r1, 0xa) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x0) umount2(&(0x7f0000000180)='./bus\x00', 0x0) [ 294.322915][ T3505] loop5: detected capacity change from 0 to 4096 05:03:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 294.364018][ T3510] loop1: detected capacity change from 0 to 4096 [ 294.373839][ T3511] loop3: detected capacity change from 0 to 4 [ 294.383596][ T3511] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 294.393724][ T3511] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 294.441521][ T3511] loop3: detected capacity change from 0 to 4 [ 294.448489][ T3511] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 294.466608][ T3511] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 294.477313][ T3538] loop5: detected capacity change from 0 to 4096 05:03:28 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x82e, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x22000, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:28 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000480)=@filename='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='rpc_pipefs\x00', 0x84010, &(0x7f0000000540)='ext4\x00') write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(r1, 0x1, 0x0, 0x0) unlinkat(r1, &(0x7f0000000040)='./file0\x00', 0x200) chown(&(0x7f00000001c0)='./file0\x00', 0xee01, 0xee01) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x20200, 0x0) open_tree(r0, &(0x7f0000000440)='./file0\x00', 0x88801) getdents64(r2, &(0x7f00000002c0)=""/239, 0xef) 05:03:28 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x3f, 0x7, 0x4, 0xa0, 0x0, 0x9, 0x1, 0x5, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x97b9, 0x1, @perf_config_ext={0x7340, 0xfffffffffffffff9}, 0x41c68, 0x3, 0x4, 0x8, 0x2cfc, 0x5e, 0x0, 0x0, 0x1}, 0x0, 0x2, r1, 0xa) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x0) umount2(&(0x7f0000000180)='./bus\x00', 0x0) 05:03:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200068138000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 295.030809][ T3558] loop3: detected capacity change from 0 to 4 [ 295.039409][ T3560] loop5: detected capacity change from 0 to 4096 [ 295.054594][ T3558] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 295.064660][ T3565] loop1: detected capacity change from 0 to 4096 05:03:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:29 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x3f, 0x7, 0x4, 0xa0, 0x0, 0x9, 0x1, 0x5, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x97b9, 0x1, @perf_config_ext={0x7340, 0xfffffffffffffff9}, 0x41c68, 0x3, 0x4, 0x8, 0x2cfc, 0x5e, 0x0, 0x0, 0x1}, 0x0, 0x2, r1, 0xa) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x0) umount2(&(0x7f0000000180)='./bus\x00', 0x0) 05:03:29 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x0, 0x28120001) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900170309000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000440)=ANY=[@ANYRES64, @ANYRESHEX=r0, @ANYRES32=r0, @ANYBLOB="2dc19811846b8b1adaa526d9851334e8297d1b8dff878e44324a4bce9323663ec58f85261a1aca41bb512c088a57647bf13a46f808aa0a3f0f3027c9e9151578a8496c759d6689e82da74bfadf0824e1aa1fdd39cc7a9ff3675bb5ff0b2a732b8fba3fbe3f61896222e41b59bad28a016b9b9f002897d0ee104b7e687503ad0e9ac180b2f2dc4d450714ed8db990d49ed4c0da84b093df07931e5abc88c329af48b38bb1ef7fff735d35f9be985f91752c0bed13091befa0", @ANYRES32=r1, @ANYRESHEX, @ANYRESOCT, @ANYRES16, @ANYRESHEX=r0]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(r2, 0x0, 0xfd14) fallocate(r2, 0x1, 0x0, 0x28120001) unlinkat(r2, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r3 = openat$cgroup(r2, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) fallocate(r3, 0x2a, 0x54, 0x3f) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r4, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 295.081241][ T3558] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 295.136549][ T3558] loop3: detected capacity change from 0 to 4 [ 295.153830][ T3558] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled 05:03:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 295.186844][ T3558] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 295.199062][ T3597] loop5: detected capacity change from 0 to 4096 [ 295.217186][ T3602] loop1: detected capacity change from 0 to 4096 05:03:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000208000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:29 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x3f, 0x7, 0x4, 0xa0, 0x0, 0x9, 0x1, 0x5, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x97b9, 0x1, @perf_config_ext={0x7340, 0xfffffffffffffff9}, 0x41c68, 0x3, 0x4, 0x8, 0x2cfc, 0x5e, 0x0, 0x0, 0x1}, 0x0, 0x2, r1, 0xa) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x0) [ 295.310027][ T3616] loop3: detected capacity change from 0 to 4 [ 295.324261][ T3616] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 295.334025][ T3616] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 295.369145][ T3628] loop1: detected capacity change from 0 to 4096 [ 295.377995][ T3625] loop5: detected capacity change from 0 to 4096 05:03:29 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xa00, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x0) chown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200010208000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:29 executing program 5: lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:29 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x3f, 0x7, 0x4, 0xa0, 0x0, 0x9, 0x1, 0x5, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x97b9, 0x1, @perf_config_ext={0x7340, 0xfffffffffffffff9}, 0x41c68, 0x3, 0x4, 0x8, 0x2cfc, 0x5e, 0x0, 0x0, 0x1}, 0x0, 0x2, r1, 0xa) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) 05:03:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x22800, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:29 executing program 5: lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 295.919106][ T3659] loop1: detected capacity change from 0 to 4096 [ 295.925573][ T3661] loop3: detected capacity change from 0 to 4 05:03:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x0) chown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 295.961818][ T3661] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled 05:03:29 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x3f, 0x7, 0x4, 0xa0, 0x0, 0x9, 0x1, 0x5, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x97b9, 0x1, @perf_config_ext={0x7340, 0xfffffffffffffff9}, 0x41c68, 0x3, 0x4, 0x8, 0x2cfc, 0x5e, 0x0, 0x0, 0x1}, 0x0, 0x2, r1, 0xa) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:03:29 executing program 5: lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 296.005080][ T3661] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x0) chown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 296.063996][ T3661] loop3: detected capacity change from 0 to 4 [ 296.074428][ T3661] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled 05:03:30 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 296.123549][ T3661] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 296.123562][ T3699] loop1: detected capacity change from 0 to 4096 [ 296.203669][ T3711] loop5: detected capacity change from 0 to 4096 05:03:30 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xf00, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x23000, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x6, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:30 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) creat(0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:03:30 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000228000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 296.839734][ T3738] loop1: detected capacity change from 0 to 4096 [ 296.847836][ T3739] loop5: detected capacity change from 0 to 4096 [ 296.855914][ T3732] loop3: detected capacity change from 0 to 4 05:03:30 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:30 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:03:30 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) [ 296.880379][ T3732] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 296.905416][ T3732] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000258000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x23800, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 296.971722][ T3759] loop5: detected capacity change from 0 to 4096 [ 296.974602][ T3732] loop3: detected capacity change from 0 to 4 [ 296.986153][ T3732] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 296.995855][ T3732] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 297.007808][ T3776] loop1: detected capacity change from 0 to 4096 [ 297.069817][ T3784] loop3: detected capacity change from 0 to 4 [ 297.101347][ T3784] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 297.114599][ T3784] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 297.192993][ T3784] loop3: detected capacity change from 0 to 4 [ 297.197997][ T3797] loop5: detected capacity change from 0 to 4096 [ 297.205465][ T3784] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 297.215163][ T3784] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:31 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1a00, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:31 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x28120001) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:03:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x24000, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000288000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:31 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 297.681244][ T3823] loop1: detected capacity change from 0 to 4096 [ 297.694974][ T3826] loop3: detected capacity change from 0 to 4 [ 297.701655][ T3829] loop5: detected capacity change from 0 to 4096 05:03:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 297.739385][ T3826] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 297.749068][ T3826] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000228000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000002e8000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 297.801913][ T3847] loop1: detected capacity change from 0 to 4096 05:03:31 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:03:31 executing program 4 (fault-call:1 fault-nth:0): r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x0, 0x28120001) umount2(0x0, 0x0) 05:03:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x24800, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 297.855600][ T3861] loop3: detected capacity change from 0 to 4 [ 297.866406][ T3861] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 297.875935][ T3858] loop5: detected capacity change from 0 to 4096 [ 297.883000][ T3861] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 297.952767][ T3861] loop3: detected capacity change from 0 to 4 [ 297.959844][ T3861] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 297.970554][ T3861] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 298.001463][ T3881] FAULT_INJECTION: forcing a failure. [ 298.001463][ T3881] name failslab, interval 1, probability 0, space 0, times 0 [ 298.014168][ T3881] CPU: 0 PID: 3881 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 298.022503][ T3881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.032656][ T3881] Call Trace: [ 298.035968][ T3881] dump_stack+0x137/0x19d [ 298.040381][ T3881] should_fail+0x23c/0x250 [ 298.044809][ T3881] ? kcalloc+0x32/0x50 [ 298.048890][ T3881] __should_failslab+0x81/0x90 [ 298.053664][ T3881] should_failslab+0x5/0x20 [ 298.058153][ T3881] __kmalloc+0x66/0x340 [ 298.062361][ T3881] ? __list_del_entry_valid+0x54/0xc0 [ 298.067715][ T3881] ? __inc_numa_state+0x10/0x50 [ 298.072545][ T3881] kcalloc+0x32/0x50 [ 298.076420][ T3881] ext4_find_extent+0x21c/0x7f0 [ 298.081251][ T3881] ext4_ext_map_blocks+0xd9/0x1f00 [ 298.086343][ T3881] ? mntput+0x45/0x70 [ 298.090311][ T3881] ? get_page_from_freelist+0x53e/0x800 [ 298.095903][ T3881] ? __down_read_common+0x16b/0x5a0 [ 298.101137][ T3881] ? percpu_counter_add_batch+0x69/0xd0 [ 298.106720][ T3881] ? ext4_es_lookup_extent+0x206/0x490 [ 298.112266][ T3881] ext4_map_blocks+0x1be/0xef0 [ 298.117058][ T3881] ? ext4_alloc_file_blocks+0x248/0x720 [ 298.122635][ T3881] ? __cond_resched+0x11/0x40 [ 298.127329][ T3881] ext4_alloc_file_blocks+0x271/0x720 [ 298.132719][ T3881] ext4_fallocate+0x2a7/0x4d0 [ 298.137377][ T3881] ? ext4_ext_truncate+0x170/0x170 [ 298.142469][ T3881] vfs_fallocate+0x463/0x660 [ 298.147062][ T3881] __x64_sys_fallocate+0x75/0xc0 [ 298.152007][ T3881] do_syscall_64+0x4a/0x90 [ 298.156408][ T3881] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 298.162301][ T3881] RIP: 0033:0x4665f9 [ 298.166175][ T3881] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 298.185802][ T3881] RSP: 002b:00007f7b570ed188 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 298.194232][ T3881] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 298.202289][ T3881] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000003 [ 298.210343][ T3881] RBP: 00007f7b570ed1d0 R08: 0000000000000000 R09: 0000000000000000 [ 298.218297][ T3881] R10: 0000000028120001 R11: 0000000000000246 R12: 0000000000000001 [ 298.226253][ T3881] R13: 00007ffd3f0d439f R14: 00007f7b570ed300 R15: 0000000000022000 [ 298.257226][ T3880] loop1: detected capacity change from 0 to 4096 05:03:32 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2e08, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x25000, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000003f8000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:32 executing program 4 (fault-call:1 fault-nth:1): r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x0, 0x28120001) umount2(0x0, 0x0) 05:03:32 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 298.563458][ T3912] loop3: detected capacity change from 0 to 4 [ 298.573902][ T3912] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 298.583694][ T3912] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 298.605218][ T3916] FAULT_INJECTION: forcing a failure. [ 298.605218][ T3916] name failslab, interval 1, probability 0, space 0, times 0 [ 298.617882][ T3916] CPU: 1 PID: 3916 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 298.626340][ T3916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.636407][ T3916] Call Trace: [ 298.639685][ T3916] dump_stack+0x137/0x19d [ 298.644030][ T3916] should_fail+0x23c/0x250 [ 298.648056][ T3917] loop5: detected capacity change from 0 to 768 [ 298.648543][ T3916] ? __es_insert_extent+0x51f/0xe70 [ 298.659970][ T3916] __should_failslab+0x81/0x90 [ 298.664782][ T3916] should_failslab+0x5/0x20 [ 298.669285][ T3916] kmem_cache_alloc+0x46/0x2f0 [ 298.674053][ T3916] __es_insert_extent+0x51f/0xe70 [ 298.679119][ T3916] ? kcalloc+0x32/0x50 [ 298.683258][ T3916] ? __kmalloc+0x23d/0x340 [ 298.688290][ T3916] ? kcalloc+0x32/0x50 [ 298.692357][ T3916] ext4_es_insert_extent+0x1bb/0x19d0 [ 298.697728][ T3916] ? ext4_ext_convert_to_initialized+0xf50/0xf50 [ 298.704123][ T3916] ext4_ext_map_blocks+0xf79/0x1f00 [ 298.709329][ T3916] ? mntput+0x45/0x70 [ 298.713326][ T3916] ? get_page_from_freelist+0x53e/0x800 [ 298.718867][ T3916] ? __down_read_common+0x16b/0x5a0 [ 298.724077][ T3916] ? percpu_counter_add_batch+0x69/0xd0 [ 298.729620][ T3916] ? ext4_es_lookup_extent+0x206/0x490 [ 298.735090][ T3916] ext4_map_blocks+0x1be/0xef0 [ 298.739909][ T3916] ? ext4_alloc_file_blocks+0x248/0x720 [ 298.745477][ T3916] ? __cond_resched+0x11/0x40 [ 298.750154][ T3916] ext4_alloc_file_blocks+0x271/0x720 [ 298.755537][ T3916] ext4_fallocate+0x2a7/0x4d0 [ 298.760210][ T3916] ? ext4_ext_truncate+0x170/0x170 [ 298.765389][ T3916] vfs_fallocate+0x463/0x660 [ 298.769974][ T3916] __x64_sys_fallocate+0x75/0xc0 [ 298.774913][ T3916] do_syscall_64+0x4a/0x90 [ 298.779350][ T3916] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 298.785248][ T3916] RIP: 0033:0x4665f9 [ 298.789136][ T3916] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 298.808765][ T3916] RSP: 002b:00007f7b570ed188 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 298.817240][ T3916] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 298.825205][ T3916] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000003 [ 298.833192][ T3916] RBP: 00007f7b570ed1d0 R08: 0000000000000000 R09: 0000000000000000 [ 298.841163][ T3916] R10: 0000000028120001 R11: 0000000000000246 R12: 0000000000000001 [ 298.849146][ T3916] R13: 00007ffd3f0d439f R14: 00007f7b570ed300 R15: 0000000000022000 05:03:32 executing program 4 (fault-call:1 fault-nth:2): r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x0, 0x28120001) umount2(0x0, 0x0) 05:03:32 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 298.866756][ T3921] loop1: detected capacity change from 0 to 4096 [ 298.875955][ T3912] loop3: detected capacity change from 0 to 4 [ 298.890020][ T3912] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 298.932852][ T3912] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 298.963709][ T3917] EXT4-fs (loop5): bad geometry: block count 512 exceeds size of device (96 blocks) [ 298.977115][ T3946] FAULT_INJECTION: forcing a failure. [ 298.977115][ T3946] name failslab, interval 1, probability 0, space 0, times 0 [ 298.989773][ T3946] CPU: 1 PID: 3946 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 298.998210][ T3946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.008284][ T3946] Call Trace: [ 299.011581][ T3946] dump_stack+0x137/0x19d [ 299.015915][ T3946] should_fail+0x23c/0x250 [ 299.020334][ T3946] ? kcalloc+0x32/0x50 [ 299.024399][ T3946] __should_failslab+0x81/0x90 [ 299.029175][ T3946] should_failslab+0x5/0x20 [ 299.033762][ T3946] __kmalloc+0x66/0x340 [ 299.037916][ T3946] ? kcalloc+0x32/0x50 [ 299.041981][ T3946] kcalloc+0x32/0x50 [ 299.045901][ T3946] ext4_find_extent+0x21c/0x7f0 [ 299.050841][ T3946] ? kfree+0xf0/0x1d0 [ 299.054882][ T3946] ext4_ext_map_blocks+0xd9/0x1f00 [ 299.060067][ T3946] ? mntput+0x45/0x70 [ 299.064057][ T3946] ? __down_write_common+0x45/0x890 [ 299.069252][ T3946] ? get_page_from_freelist+0x53e/0x800 [ 299.074872][ T3946] ? __down_read_common+0x16b/0x5a0 [ 299.080067][ T3946] ? percpu_counter_add_batch+0x69/0xd0 [ 299.085612][ T3946] ? ext4_es_lookup_extent+0x206/0x490 [ 299.091074][ T3946] ext4_map_blocks+0x70d/0xef0 [ 299.095857][ T3946] ? ext4_alloc_file_blocks+0x248/0x720 [ 299.101478][ T3946] ? __cond_resched+0x11/0x40 [ 299.106154][ T3946] ext4_alloc_file_blocks+0x271/0x720 [ 299.111548][ T3946] ext4_fallocate+0x2a7/0x4d0 [ 299.116255][ T3946] ? ext4_ext_truncate+0x170/0x170 [ 299.121387][ T3946] vfs_fallocate+0x463/0x660 [ 299.126029][ T3946] __x64_sys_fallocate+0x75/0xc0 [ 299.131013][ T3946] do_syscall_64+0x4a/0x90 [ 299.135430][ T3946] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 299.141386][ T3946] RIP: 0033:0x4665f9 [ 299.145387][ T3946] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 299.165001][ T3946] RSP: 002b:00007f7b570ed188 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 299.173422][ T3946] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 05:03:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x25800, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:33 executing program 4 (fault-call:1 fault-nth:3): r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x0, 0x28120001) umount2(0x0, 0x0) [ 299.181409][ T3946] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000003 [ 299.189378][ T3946] RBP: 00007f7b570ed1d0 R08: 0000000000000000 R09: 0000000000000000 [ 299.197349][ T3946] R10: 0000000028120001 R11: 0000000000000246 R12: 0000000000000001 [ 299.205372][ T3946] R13: 00007ffd3f0d439f R14: 00007f7b570ed300 R15: 0000000000022000 05:03:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000408000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 299.237095][ T3945] loop1: detected capacity change from 0 to 4096 [ 299.283859][ T3961] FAULT_INJECTION: forcing a failure. [ 299.283859][ T3961] name failslab, interval 1, probability 0, space 0, times 0 [ 299.296537][ T3961] CPU: 0 PID: 3961 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 299.304872][ T3961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.314968][ T3961] Call Trace: [ 299.318249][ T3961] dump_stack+0x137/0x19d [ 299.322580][ T3961] should_fail+0x23c/0x250 [ 299.327028][ T3961] ? ext4_mb_new_blocks+0x2e7/0x1f90 [ 299.332327][ T3961] __should_failslab+0x81/0x90 [ 299.337149][ T3961] should_failslab+0x5/0x20 [ 299.341718][ T3961] kmem_cache_alloc+0x46/0x2f0 [ 299.346487][ T3961] ext4_mb_new_blocks+0x2e7/0x1f90 [ 299.351614][ T3961] ? ext4_find_extent+0x6cf/0x7f0 [ 299.356650][ T3961] ? ext4_ext_search_right+0x300/0x540 [ 299.362119][ T3961] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 299.367926][ T3961] ext4_ext_map_blocks+0x1569/0x1f00 [ 299.373238][ T3961] ? __down_read_common+0x16b/0x5a0 [ 299.378508][ T3961] ? percpu_counter_add_batch+0x69/0xd0 [ 299.384061][ T3961] ? ext4_es_lookup_extent+0x206/0x490 [ 299.389532][ T3961] ext4_map_blocks+0x70d/0xef0 [ 299.394304][ T3961] ? ext4_alloc_file_blocks+0x248/0x720 [ 299.400073][ T3961] ? __cond_resched+0x11/0x40 [ 299.404826][ T3961] ext4_alloc_file_blocks+0x271/0x720 [ 299.410214][ T3961] ext4_fallocate+0x2a7/0x4d0 [ 299.414984][ T3961] ? ext4_ext_truncate+0x170/0x170 [ 299.420149][ T3961] vfs_fallocate+0x463/0x660 [ 299.424742][ T3961] __x64_sys_fallocate+0x75/0xc0 [ 299.429742][ T3961] do_syscall_64+0x4a/0x90 [ 299.434170][ T3961] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 299.434896][ T3967] loop3: detected capacity change from 0 to 4 [ 299.440116][ T3961] RIP: 0033:0x4665f9 [ 299.440188][ T3961] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 299.452533][ T3966] loop5: detected capacity change from 0 to 768 [ 299.469759][ T3961] RSP: 002b:00007f7b570ed188 EFLAGS: 00000246 ORIG_RAX: 000000000000011d 05:03:33 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x3400, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x26000, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:33 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 299.469788][ T3961] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 299.469799][ T3961] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000003 [ 299.469811][ T3961] RBP: 00007f7b570ed1d0 R08: 0000000000000000 R09: 0000000000000000 [ 299.476862][ T3967] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 299.484433][ T3961] R10: 0000000028120001 R11: 0000000000000246 R12: 0000000000000001 [ 299.484451][ T3961] R13: 00007ffd3f0d439f R14: 00007f7b570ed300 R15: 0000000000022000 05:03:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 299.535138][ T3966] EXT4-fs (loop5): Unrecognized mount option "system.posix_acl_access" or missing value [ 299.537533][ T3967] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:33 executing program 4 (fault-call:1 fault-nth:4): r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x0, 0x28120001) umount2(0x0, 0x0) [ 299.586431][ T3967] loop3: detected capacity change from 0 to 4 [ 299.593514][ T3967] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 299.631779][ T3967] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 299.650370][ T4006] FAULT_INJECTION: forcing a failure. [ 299.650370][ T4006] name failslab, interval 1, probability 0, space 0, times 0 [ 299.663117][ T4006] CPU: 1 PID: 4006 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 299.671451][ T4006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.674264][ T4008] loop1: detected capacity change from 0 to 4096 [ 299.681607][ T4006] Call Trace: [ 299.681617][ T4006] dump_stack+0x137/0x19d [ 299.681673][ T4006] should_fail+0x23c/0x250 [ 299.688254][ T4009] loop5: detected capacity change from 0 to 768 [ 299.691284][ T4006] ? ext4_mb_new_blocks+0x70f/0x1f90 [ 299.691312][ T4006] __should_failslab+0x81/0x90 [ 299.691336][ T4006] should_failslab+0x5/0x20 [ 299.720953][ T4006] kmem_cache_alloc+0x46/0x2f0 [ 299.725728][ T4006] ext4_mb_new_blocks+0x70f/0x1f90 [ 299.730855][ T4006] ? ext4_find_extent+0x6cf/0x7f0 [ 299.735880][ T4006] ? ext4_ext_search_right+0x300/0x540 [ 299.741541][ T4006] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 299.747269][ T4006] ext4_ext_map_blocks+0x1569/0x1f00 [ 299.752609][ T4006] ? __down_read_common+0x16b/0x5a0 [ 299.757804][ T4006] ? percpu_counter_add_batch+0x69/0xd0 [ 299.763346][ T4006] ? ext4_es_lookup_extent+0x206/0x490 [ 299.768826][ T4006] ext4_map_blocks+0x70d/0xef0 [ 299.773593][ T4006] ? ext4_alloc_file_blocks+0x248/0x720 [ 299.779153][ T4006] ? __cond_resched+0x11/0x40 [ 299.783824][ T4006] ext4_alloc_file_blocks+0x271/0x720 [ 299.789199][ T4006] ext4_fallocate+0x2a7/0x4d0 [ 299.793872][ T4006] ? ext4_ext_truncate+0x170/0x170 [ 299.798980][ T4006] vfs_fallocate+0x463/0x660 [ 299.803570][ T4006] __x64_sys_fallocate+0x75/0xc0 [ 299.808503][ T4006] do_syscall_64+0x4a/0x90 [ 299.813012][ T4006] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 299.818982][ T4006] RIP: 0033:0x4665f9 [ 299.822872][ T4006] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 299.842521][ T4006] RSP: 002b:00007f7b570ed188 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 299.850961][ T4006] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 299.858935][ T4006] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000003 [ 299.866912][ T4006] RBP: 00007f7b570ed1d0 R08: 0000000000000000 R09: 0000000000000000 [ 299.874900][ T4006] R10: 0000000028120001 R11: 0000000000000246 R12: 0000000000000001 05:03:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:33 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:03:33 executing program 4 (fault-call:1 fault-nth:5): r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x0, 0x28120001) umount2(0x0, 0x0) 05:03:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000488000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 299.882879][ T4006] R13: 00007ffd3f0d439f R14: 00007f7b570ed300 R15: 0000000000022000 [ 299.901124][ T4009] EXT4-fs (loop5): bad geometry: block count 512 exceeds size of device (96 blocks) 05:03:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x26800, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 300.031958][ T4038] loop1: detected capacity change from 0 to 4096 [ 300.039612][ T4040] FAULT_INJECTION: forcing a failure. [ 300.039612][ T4040] name failslab, interval 1, probability 0, space 0, times 0 [ 300.052257][ T4040] CPU: 1 PID: 4040 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 300.060663][ T4040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.070790][ T4040] Call Trace: [ 300.074152][ T4040] dump_stack+0x137/0x19d [ 300.078546][ T4040] should_fail+0x23c/0x250 [ 300.083022][ T4040] ? __es_insert_extent+0x51f/0xe70 [ 300.088287][ T4040] __should_failslab+0x81/0x90 [ 300.093066][ T4040] should_failslab+0x5/0x20 [ 300.097585][ T4040] kmem_cache_alloc+0x46/0x2f0 [ 300.102477][ T4040] __es_insert_extent+0x51f/0xe70 [ 300.107561][ T4040] ? ext4_ext_map_blocks+0x10a8/0x1f00 [ 300.113035][ T4040] ext4_es_insert_extent+0x1bb/0x19d0 [ 300.118459][ T4040] ? ext4_es_lookup_extent+0x206/0x490 [ 300.123975][ T4040] ext4_map_blocks+0xa4c/0xef0 [ 300.128814][ T4040] ? ext4_alloc_file_blocks+0x248/0x720 [ 300.134365][ T4040] ? __cond_resched+0x11/0x40 [ 300.139095][ T4040] ext4_alloc_file_blocks+0x271/0x720 [ 300.144503][ T4040] ext4_fallocate+0x2a7/0x4d0 [ 300.149194][ T4040] ? ext4_ext_truncate+0x170/0x170 [ 300.154314][ T4040] vfs_fallocate+0x463/0x660 [ 300.158931][ T4040] __x64_sys_fallocate+0x75/0xc0 [ 300.164025][ T4040] do_syscall_64+0x4a/0x90 [ 300.168446][ T4040] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 300.174343][ T4040] RIP: 0033:0x4665f9 [ 300.178247][ T4040] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 300.197857][ T4040] RSP: 002b:00007f7b570ed188 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 300.206328][ T4040] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 300.214317][ T4040] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000003 [ 300.222291][ T4040] RBP: 00007f7b570ed1d0 R08: 0000000000000000 R09: 0000000000000000 [ 300.230283][ T4040] R10: 0000000028120001 R11: 0000000000000246 R12: 0000000000000001 [ 300.238258][ T4040] R13: 00007ffd3f0d439f R14: 00007f7b570ed300 R15: 0000000000022000 [ 300.246948][ T4041] loop3: detected capacity change from 0 to 4 [ 300.259846][ T4041] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled 05:03:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 300.278463][ T4041] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:34 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:34 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:03:34 executing program 4 (fault-call:1 fault-nth:6): r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x0, 0x28120001) umount2(0x0, 0x0) 05:03:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x27000, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 300.357666][ T4041] loop3: detected capacity change from 0 to 4 [ 300.378419][ T4041] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 300.395532][ T4041] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000004c8000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 300.484980][ T4088] loop1: detected capacity change from 0 to 4096 [ 300.492726][ T4089] loop5: detected capacity change from 0 to 4096 [ 300.509878][ T4093] FAULT_INJECTION: forcing a failure. [ 300.509878][ T4093] name failslab, interval 1, probability 0, space 0, times 0 [ 300.522558][ T4093] CPU: 0 PID: 4093 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 300.530895][ T4093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.540967][ T4093] Call Trace: [ 300.544247][ T4093] dump_stack+0x137/0x19d [ 300.548591][ T4093] should_fail+0x23c/0x250 [ 300.553020][ T4093] ? kcalloc+0x32/0x50 [ 300.557229][ T4093] __should_failslab+0x81/0x90 [ 300.562049][ T4093] should_failslab+0x5/0x20 [ 300.566611][ T4093] __kmalloc+0x66/0x340 [ 300.570780][ T4093] ? chksum_update+0x39/0x50 [ 300.575456][ T4093] kcalloc+0x32/0x50 [ 300.579426][ T4093] ext4_find_extent+0x21c/0x7f0 [ 300.584286][ T4093] ? __es_insert_extent+0xbf3/0xe70 [ 300.589578][ T4093] ext4_ext_map_blocks+0xd9/0x1f00 [ 300.594806][ T4093] ? __ext4_handle_dirty_metadata+0x20c/0x590 [ 300.600927][ T4093] ? ext4_inode_csum+0x3a6/0x430 [ 300.606113][ T4093] ? __down_write_common+0x45/0x890 [ 300.611441][ T4093] ? __brelse+0x2c/0x50 [ 300.615669][ T4093] ? percpu_counter_add_batch+0x69/0xd0 [ 300.621245][ T4093] ? ext4_es_lookup_extent+0x36b/0x490 [ 300.626778][ T4093] ext4_map_blocks+0x70d/0xef0 [ 300.631596][ T4093] ? ext4_alloc_file_blocks+0x248/0x720 [ 300.637178][ T4093] ? __cond_resched+0x11/0x40 [ 300.641869][ T4093] ext4_alloc_file_blocks+0x271/0x720 [ 300.647261][ T4093] ext4_fallocate+0x2a7/0x4d0 [ 300.651959][ T4093] ? ext4_ext_truncate+0x170/0x170 [ 300.657106][ T4093] vfs_fallocate+0x463/0x660 [ 300.661720][ T4093] __x64_sys_fallocate+0x75/0xc0 [ 300.666702][ T4093] do_syscall_64+0x4a/0x90 [ 300.671134][ T4093] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 300.677056][ T4093] RIP: 0033:0x4665f9 [ 300.680968][ T4093] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 300.700606][ T4093] RSP: 002b:00007f7b570ed188 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 300.709056][ T4093] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 300.717040][ T4093] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000003 [ 300.725100][ T4093] RBP: 00007f7b570ed1d0 R08: 0000000000000000 R09: 0000000000000000 [ 300.733082][ T4093] R10: 0000000028120001 R11: 0000000000000246 R12: 0000000000000001 [ 300.741062][ T4093] R13: 00007ffd3f0d439f R14: 00007f7b570ed300 R15: 0000000000022000 [ 300.758558][ T4096] loop3: detected capacity change from 0 to 4 05:03:34 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:03:34 executing program 4 (fault-call:1 fault-nth:7): r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x0, 0x28120001) umount2(0x0, 0x0) [ 300.784278][ T4096] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 300.791317][ T4089] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 300.813240][ T4089] EXT4-fs (loop5): mount failed 05:03:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 300.828074][ T4096] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x27800, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 300.891007][ T4096] loop3: detected capacity change from 0 to 4 [ 300.905355][ T4096] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 300.921627][ T4130] FAULT_INJECTION: forcing a failure. [ 300.921627][ T4130] name failslab, interval 1, probability 0, space 0, times 0 [ 300.934325][ T4130] CPU: 1 PID: 4130 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 300.934479][ T4096] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 300.942664][ T4130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.942680][ T4130] Call Trace: [ 300.942689][ T4130] dump_stack+0x137/0x19d [ 300.942716][ T4130] should_fail+0x23c/0x250 [ 300.974025][ T4130] ? ext4_mb_new_blocks+0x2e7/0x1f90 [ 300.979312][ T4130] __should_failslab+0x81/0x90 [ 300.984079][ T4130] should_failslab+0x5/0x20 [ 300.988598][ T4130] kmem_cache_alloc+0x46/0x2f0 [ 300.993391][ T4130] ext4_mb_new_blocks+0x2e7/0x1f90 [ 300.995475][ T4132] loop1: detected capacity change from 0 to 4096 [ 300.998512][ T4130] ? ext4_find_extent+0x7b2/0x7f0 [ 300.998540][ T4130] ? ext4_ext_search_right+0x246/0x540 [ 301.015373][ T4130] ext4_ext_map_blocks+0x1569/0x1f00 [ 301.020663][ T4130] ? ext4_es_lookup_extent+0x36b/0x490 [ 301.026139][ T4130] ext4_map_blocks+0x70d/0xef0 [ 301.030904][ T4130] ? ext4_alloc_file_blocks+0x248/0x720 [ 301.036497][ T4130] ? __cond_resched+0x11/0x40 [ 301.041174][ T4130] ext4_alloc_file_blocks+0x271/0x720 [ 301.046681][ T4130] ext4_fallocate+0x2a7/0x4d0 [ 301.051367][ T4130] ? ext4_ext_truncate+0x170/0x170 [ 301.056504][ T4130] vfs_fallocate+0x463/0x660 [ 301.061131][ T4130] __x64_sys_fallocate+0x75/0xc0 [ 301.066078][ T4130] do_syscall_64+0x4a/0x90 [ 301.070519][ T4130] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 301.076492][ T4130] RIP: 0033:0x4665f9 [ 301.080388][ T4130] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 301.100001][ T4130] RSP: 002b:00007f7b570ed188 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 301.108478][ T4130] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 301.116460][ T4130] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000003 [ 301.124438][ T4130] RBP: 00007f7b570ed1d0 R08: 0000000000000000 R09: 0000000000000000 [ 301.132415][ T4130] R10: 0000000028120001 R11: 0000000000000246 R12: 0000000000000001 05:03:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000608000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:35 executing program 4 (fault-call:1 fault-nth:8): r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x0, 0x28120001) umount2(0x0, 0x0) [ 301.140394][ T4130] R13: 00007ffd3f0d439f R14: 00007f7b570ed300 R15: 0000000000022000 [ 301.158450][ T4133] loop5: detected capacity change from 0 to 4096 [ 301.176726][ T4133] EXT4-fs (loop5): Unrecognized mount option "system.posix_acl_access" or missing value [ 301.224913][ T4154] loop3: detected capacity change from 0 to 4 [ 301.230741][ T4153] FAULT_INJECTION: forcing a failure. [ 301.230741][ T4153] name failslab, interval 1, probability 0, space 0, times 0 [ 301.239027][ T4154] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 301.243666][ T4153] CPU: 1 PID: 4153 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 301.261382][ T4153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.271458][ T4153] Call Trace: [ 301.274740][ T4153] dump_stack+0x137/0x19d [ 301.279081][ T4153] should_fail+0x23c/0x250 [ 301.283511][ T4153] ? ext4_mb_new_blocks+0x70f/0x1f90 [ 301.288830][ T4153] __should_failslab+0x81/0x90 [ 301.293646][ T4153] should_failslab+0x5/0x20 [ 301.298198][ T4153] kmem_cache_alloc+0x46/0x2f0 [ 301.302973][ T4153] ext4_mb_new_blocks+0x70f/0x1f90 [ 301.308093][ T4153] ? ext4_find_extent+0x7b2/0x7f0 [ 301.313126][ T4153] ? ext4_ext_search_right+0x246/0x540 [ 301.318665][ T4153] ext4_ext_map_blocks+0x1569/0x1f00 [ 301.323978][ T4153] ? ext4_es_lookup_extent+0x36b/0x490 [ 301.329443][ T4153] ext4_map_blocks+0x70d/0xef0 [ 301.334231][ T4153] ? ext4_alloc_file_blocks+0x248/0x720 [ 301.339826][ T4153] ? __cond_resched+0x11/0x40 [ 301.344594][ T4153] ext4_alloc_file_blocks+0x271/0x720 [ 301.349966][ T4153] ext4_fallocate+0x2a7/0x4d0 [ 301.354640][ T4153] ? ext4_ext_truncate+0x170/0x170 [ 301.359759][ T4153] vfs_fallocate+0x463/0x660 [ 301.364346][ T4153] __x64_sys_fallocate+0x75/0xc0 [ 301.369280][ T4153] do_syscall_64+0x4a/0x90 [ 301.373695][ T4153] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 301.379681][ T4153] RIP: 0033:0x4665f9 [ 301.383592][ T4153] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 301.403218][ T4153] RSP: 002b:00007f7b570ed188 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 301.411634][ T4153] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 05:03:35 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x4102, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:35 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:03:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 301.419661][ T4153] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000003 [ 301.427646][ T4153] RBP: 00007f7b570ed1d0 R08: 0000000000000000 R09: 0000000000000000 [ 301.435659][ T4153] R10: 0000000028120001 R11: 0000000000000246 R12: 0000000000000001 [ 301.443642][ T4153] R13: 00007ffd3f0d439f R14: 00007f7b570ed300 R15: 0000000000022000 [ 301.460460][ T4154] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:35 executing program 4 (fault-call:1 fault-nth:9): r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x0, 0x28120001) umount2(0x0, 0x0) [ 301.551750][ T4171] loop5: detected capacity change from 0 to 4096 [ 301.553698][ T4172] loop1: detected capacity change from 0 to 4096 [ 301.559273][ T4154] loop3: detected capacity change from 0 to 4 [ 301.589991][ T4180] FAULT_INJECTION: forcing a failure. [ 301.589991][ T4180] name failslab, interval 1, probability 0, space 0, times 0 [ 301.602743][ T4180] CPU: 1 PID: 4180 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 301.611093][ T4180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.619772][ T4171] EXT4-fs (loop5): Unrecognized mount option "system.posix_acl_access" or missing value [ 301.621151][ T4180] Call Trace: [ 301.621161][ T4180] dump_stack+0x137/0x19d [ 301.621188][ T4180] should_fail+0x23c/0x250 [ 301.632822][ T4154] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled 05:03:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x28000, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:35 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 301.634165][ T4180] ? __es_insert_extent+0x51f/0xe70 [ 301.638648][ T4154] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 301.642896][ T4180] __should_failslab+0x81/0x90 [ 301.671518][ T4180] should_failslab+0x5/0x20 [ 301.676067][ T4180] kmem_cache_alloc+0x46/0x2f0 [ 301.680845][ T4180] __es_insert_extent+0x51f/0xe70 [ 301.685853][ T4180] ext4_es_insert_extent+0x1bb/0x19d0 [ 301.691382][ T4180] ? ext4_es_lookup_extent+0x36b/0x490 [ 301.696861][ T4180] ext4_map_blocks+0xa4c/0xef0 [ 301.701607][ T4180] ? ext4_alloc_file_blocks+0x248/0x720 [ 301.707135][ T4180] ? __cond_resched+0x11/0x40 [ 301.711859][ T4180] ext4_alloc_file_blocks+0x271/0x720 [ 301.717268][ T4180] ext4_fallocate+0x2a7/0x4d0 [ 301.722016][ T4180] ? ext4_ext_truncate+0x170/0x170 [ 301.727185][ T4180] vfs_fallocate+0x463/0x660 [ 301.731755][ T4180] __x64_sys_fallocate+0x75/0xc0 [ 301.736681][ T4180] do_syscall_64+0x4a/0x90 [ 301.741105][ T4180] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 301.746984][ T4180] RIP: 0033:0x4665f9 [ 301.750855][ T4180] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 301.770491][ T4180] RSP: 002b:00007f7b570ed188 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 301.778894][ T4180] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 301.786856][ T4180] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000003 [ 301.794813][ T4180] RBP: 00007f7b570ed1d0 R08: 0000000000000000 R09: 0000000000000000 05:03:35 executing program 4 (fault-call:1 fault-nth:10): r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x0, 0x28120001) umount2(0x0, 0x0) [ 301.802778][ T4180] R10: 0000000028120001 R11: 0000000000000246 R12: 0000000000000002 [ 301.810840][ T4180] R13: 00007ffd3f0d439f R14: 00007f7b570ed300 R15: 0000000000022000 05:03:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200013678000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 301.899475][ T4202] loop5: detected capacity change from 0 to 4096 [ 301.934391][ T4208] FAULT_INJECTION: forcing a failure. [ 301.934391][ T4208] name failslab, interval 1, probability 0, space 0, times 0 [ 301.947132][ T4208] CPU: 1 PID: 4208 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 301.951909][ T4209] loop3: detected capacity change from 0 to 4 [ 301.955473][ T4208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.955487][ T4208] Call Trace: [ 301.955495][ T4208] dump_stack+0x137/0x19d [ 301.979180][ T4208] should_fail+0x23c/0x250 [ 301.983645][ T4208] ? ext4_mb_new_blocks+0x2e7/0x1f90 [ 301.989011][ T4208] __should_failslab+0x81/0x90 [ 301.993873][ T4208] should_failslab+0x5/0x20 [ 301.998378][ T4208] kmem_cache_alloc+0x46/0x2f0 [ 302.003239][ T4208] ext4_mb_new_blocks+0x2e7/0x1f90 [ 302.008356][ T4208] ? ext4_find_extent+0x7b2/0x7f0 [ 302.013402][ T4208] ? ext4_ext_search_right+0x246/0x540 [ 302.018895][ T4208] ext4_ext_map_blocks+0x1569/0x1f00 [ 302.024184][ T4208] ? ext4_es_lookup_extent+0x36b/0x490 [ 302.029660][ T4208] ext4_map_blocks+0x70d/0xef0 [ 302.034426][ T4208] ? ext4_alloc_file_blocks+0x248/0x720 [ 302.040032][ T4208] ? __cond_resched+0x11/0x40 [ 302.044728][ T4208] ext4_alloc_file_blocks+0x271/0x720 [ 302.050109][ T4208] ext4_fallocate+0x2a7/0x4d0 [ 302.054794][ T4208] ? ext4_ext_truncate+0x170/0x170 [ 302.059911][ T4208] vfs_fallocate+0x463/0x660 [ 302.064507][ T4208] __x64_sys_fallocate+0x75/0xc0 [ 302.069459][ T4208] do_syscall_64+0x4a/0x90 [ 302.073932][ T4208] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 302.079937][ T4208] RIP: 0033:0x4665f9 [ 302.083866][ T4208] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 302.103629][ T4208] RSP: 002b:00007f7b570ed188 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 302.112055][ T4208] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 302.120069][ T4208] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000003 [ 302.128307][ T4208] RBP: 00007f7b570ed1d0 R08: 0000000000000000 R09: 0000000000000000 [ 302.136303][ T4208] R10: 0000000028120001 R11: 0000000000000246 R12: 0000000000000002 05:03:36 executing program 4 (fault-call:1 fault-nth:11): r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x0, 0x28120001) umount2(0x0, 0x0) [ 302.144310][ T4208] R13: 00007ffd3f0d439f R14: 00007f7b570ed300 R15: 0000000000022000 [ 302.161766][ T4213] loop1: detected capacity change from 0 to 4096 [ 302.169003][ T4202] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 05:03:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x29800, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:36 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 302.194335][ T4209] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 302.210703][ T4209] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 302.236740][ T4202] EXT4-fs (loop5): mount failed [ 302.260561][ T4232] FAULT_INJECTION: forcing a failure. [ 302.260561][ T4232] name failslab, interval 1, probability 0, space 0, times 0 [ 302.273233][ T4232] CPU: 0 PID: 4232 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 302.281572][ T4232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.291640][ T4232] Call Trace: [ 302.294953][ T4232] dump_stack+0x137/0x19d [ 302.299345][ T4232] should_fail+0x23c/0x250 [ 302.303770][ T4232] ? ext4_mb_new_blocks+0x2e7/0x1f90 [ 302.309065][ T4232] __should_failslab+0x81/0x90 [ 302.313862][ T4232] should_failslab+0x5/0x20 [ 302.318378][ T4232] kmem_cache_alloc+0x46/0x2f0 [ 302.323166][ T4232] ext4_mb_new_blocks+0x2e7/0x1f90 [ 302.328281][ T4232] ? ext4_find_extent+0x7b2/0x7f0 [ 302.333306][ T4232] ? ext4_ext_search_right+0x246/0x540 [ 302.338770][ T4232] ext4_ext_map_blocks+0x1569/0x1f00 [ 302.344130][ T4232] ? ext4_es_lookup_extent+0x36b/0x490 [ 302.349587][ T4232] ext4_map_blocks+0x70d/0xef0 [ 302.354393][ T4232] ? ext4_alloc_file_blocks+0x248/0x720 [ 302.359968][ T4232] ? __cond_resched+0x11/0x40 [ 302.364648][ T4232] ext4_alloc_file_blocks+0x271/0x720 [ 302.370033][ T4232] ext4_fallocate+0x2a7/0x4d0 [ 302.374718][ T4232] ? ext4_ext_truncate+0x170/0x170 [ 302.379851][ T4232] vfs_fallocate+0x463/0x660 [ 302.384444][ T4232] __x64_sys_fallocate+0x75/0xc0 [ 302.389402][ T4232] do_syscall_64+0x4a/0x90 [ 302.393822][ T4232] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 302.399754][ T4232] RIP: 0033:0x4665f9 [ 302.403648][ T4232] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 302.423384][ T4232] RSP: 002b:00007f7b570ed188 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 302.431807][ T4232] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 302.439806][ T4232] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000003 [ 302.447786][ T4232] RBP: 00007f7b570ed1d0 R08: 0000000000000000 R09: 0000000000000000 05:03:36 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x5d01, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000688000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 302.455765][ T4232] R10: 0000000028120001 R11: 0000000000000246 R12: 0000000000000002 [ 302.463744][ T4232] R13: 00007ffd3f0d439f R14: 00007f7b570ed300 R15: 0000000000022000 05:03:36 executing program 4 (fault-call:1 fault-nth:12): r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x0, 0x28120001) umount2(0x0, 0x0) [ 302.526162][ T4246] loop1: detected capacity change from 0 to 4096 [ 302.552831][ T4257] loop3: detected capacity change from 0 to 4 [ 302.569254][ T4246] EXT4-fs mount: 61 callbacks suppressed [ 302.569269][ T4246] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 302.587295][ T4265] FAULT_INJECTION: forcing a failure. [ 302.587295][ T4265] name failslab, interval 1, probability 0, space 0, times 0 [ 302.600001][ T4265] CPU: 0 PID: 4265 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 302.608420][ T4265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.614987][ T4257] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 302.618484][ T4265] Call Trace: [ 302.618496][ T4265] dump_stack+0x137/0x19d [ 302.635520][ T4265] should_fail+0x23c/0x250 [ 302.639943][ T4265] ? kcalloc+0x32/0x50 [ 302.644030][ T4265] __should_failslab+0x81/0x90 [ 302.648798][ T4265] should_failslab+0x5/0x20 [ 302.653321][ T4265] __kmalloc+0x66/0x340 [ 302.657479][ T4265] ? chksum_update+0x39/0x50 [ 302.662137][ T4265] kcalloc+0x32/0x50 [ 302.666039][ T4265] ext4_find_extent+0x21c/0x7f0 [ 302.670894][ T4265] ? __es_insert_extent+0xbf3/0xe70 [ 302.676101][ T4265] ext4_ext_map_blocks+0xd9/0x1f00 [ 302.681235][ T4265] ? __ext4_handle_dirty_metadata+0x20c/0x590 [ 302.687327][ T4265] ? ext4_inode_csum+0x3a6/0x430 [ 302.692268][ T4265] ? __down_write_common+0x45/0x890 [ 302.697497][ T4265] ? __brelse+0x2c/0x50 [ 302.701665][ T4265] ? percpu_counter_add_batch+0x69/0xd0 [ 302.707286][ T4265] ? ext4_es_lookup_extent+0x36b/0x490 [ 302.712758][ T4265] ext4_map_blocks+0x70d/0xef0 [ 302.717529][ T4265] ? ext4_alloc_file_blocks+0x248/0x720 [ 302.723083][ T4265] ? __cond_resched+0x11/0x40 [ 302.727769][ T4265] ext4_alloc_file_blocks+0x271/0x720 [ 302.733160][ T4265] ext4_fallocate+0x2a7/0x4d0 [ 302.737851][ T4265] ? ext4_ext_truncate+0x170/0x170 [ 302.742977][ T4265] vfs_fallocate+0x463/0x660 [ 302.747631][ T4265] __x64_sys_fallocate+0x75/0xc0 [ 302.752574][ T4265] do_syscall_64+0x4a/0x90 [ 302.757146][ T4265] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 302.763056][ T4265] RIP: 0033:0x4665f9 [ 302.766948][ T4265] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 302.786562][ T4265] RSP: 002b:00007f7b570ed188 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 302.794985][ T4265] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 302.802972][ T4265] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000003 [ 302.810974][ T4265] RBP: 00007f7b570ed1d0 R08: 0000000000000000 R09: 0000000000000000 [ 302.818949][ T4265] R10: 0000000028120001 R11: 0000000000000246 R12: 0000000000000002 05:03:36 executing program 4 (fault-call:1 fault-nth:13): r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x0, 0x28120001) umount2(0x0, 0x0) 05:03:36 executing program 1: lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 302.826939][ T4265] R13: 00007ffd3f0d439f R14: 00007f7b570ed300 R15: 0000000000022000 [ 302.843916][ T4264] loop5: detected capacity change from 0 to 4096 [ 302.856940][ T4264] EXT4-fs (loop5): Unrecognized mount option "system.posix_acl_access" or missing value 05:03:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x2a000, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 302.887889][ T4257] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 302.917868][ T4281] FAULT_INJECTION: forcing a failure. [ 302.917868][ T4281] name failslab, interval 1, probability 0, space 0, times 0 [ 302.930565][ T4281] CPU: 1 PID: 4281 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 302.938962][ T4281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.949038][ T4281] Call Trace: [ 302.952341][ T4281] dump_stack+0x137/0x19d [ 302.956678][ T4281] should_fail+0x23c/0x250 [ 302.961100][ T4281] ? ext4_mb_new_blocks+0x2e7/0x1f90 [ 302.966445][ T4281] __should_failslab+0x81/0x90 [ 302.971294][ T4281] should_failslab+0x5/0x20 [ 302.975815][ T4281] kmem_cache_alloc+0x46/0x2f0 [ 302.980594][ T4281] ext4_mb_new_blocks+0x2e7/0x1f90 05:03:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x2a800, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 302.985716][ T4281] ? ext4_find_extent+0x7b2/0x7f0 [ 302.990744][ T4281] ? ext4_ext_search_right+0x246/0x540 [ 302.996230][ T4281] ext4_ext_map_blocks+0x1569/0x1f00 [ 303.001516][ T4281] ? ext4_es_lookup_extent+0x36b/0x490 [ 303.007043][ T4281] ext4_map_blocks+0x70d/0xef0 [ 303.011888][ T4281] ? ext4_alloc_file_blocks+0x248/0x720 [ 303.017444][ T4281] ? __cond_resched+0x11/0x40 [ 303.022126][ T4281] ext4_alloc_file_blocks+0x271/0x720 [ 303.027583][ T4281] ext4_fallocate+0x2a7/0x4d0 [ 303.032263][ T4281] ? ext4_ext_truncate+0x170/0x170 [ 303.037378][ T4281] vfs_fallocate+0x463/0x660 [ 303.041975][ T4281] __x64_sys_fallocate+0x75/0xc0 [ 303.046996][ T4281] do_syscall_64+0x4a/0x90 [ 303.051424][ T4281] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 303.057321][ T4281] RIP: 0033:0x4665f9 [ 303.061278][ T4281] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 05:03:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x2b000, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 303.080917][ T4281] RSP: 002b:00007f7b570ed188 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 303.089355][ T4281] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 303.097333][ T4281] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000003 [ 303.105308][ T4281] RBP: 00007f7b570ed1d0 R08: 0000000000000000 R09: 0000000000000000 [ 303.113290][ T4281] R10: 0000000028120001 R11: 0000000000000246 R12: 0000000000000002 [ 303.121355][ T4281] R13: 00007ffd3f0d439f R14: 00007f7b570ed300 R15: 0000000000022000 05:03:37 executing program 4 (fault-call:1 fault-nth:14): r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x0, 0x28120001) umount2(0x0, 0x0) [ 303.189280][ T4257] loop3: detected capacity change from 0 to 4 [ 303.196389][ T4257] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 303.210320][ T4315] loop5: detected capacity change from 0 to 4096 [ 303.222066][ T4257] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:37 executing program 1: lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 303.240497][ T4318] FAULT_INJECTION: forcing a failure. [ 303.240497][ T4318] name failslab, interval 1, probability 0, space 0, times 0 [ 303.253153][ T4318] CPU: 0 PID: 4318 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 303.261493][ T4318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.271639][ T4318] Call Trace: [ 303.274921][ T4318] dump_stack+0x137/0x19d [ 303.279268][ T4318] should_fail+0x23c/0x250 [ 303.283750][ T4318] ? ext4_mb_new_blocks+0x70f/0x1f90 [ 303.289068][ T4318] __should_failslab+0x81/0x90 [ 303.293849][ T4318] should_failslab+0x5/0x20 [ 303.298419][ T4318] kmem_cache_alloc+0x46/0x2f0 [ 303.303247][ T4318] ext4_mb_new_blocks+0x70f/0x1f90 [ 303.308402][ T4318] ? ext4_find_extent+0x7b2/0x7f0 [ 303.313503][ T4318] ? ext4_ext_search_right+0x246/0x540 [ 303.319005][ T4318] ext4_ext_map_blocks+0x1569/0x1f00 [ 303.324307][ T4318] ? ext4_es_lookup_extent+0x36b/0x490 [ 303.328117][ T4315] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 303.329776][ T4318] ext4_map_blocks+0x70d/0xef0 [ 303.329803][ T4318] ? ext4_alloc_file_blocks+0x248/0x720 [ 303.345134][ T4315] EXT4-fs (loop5): mount failed [ 303.348468][ T4318] ? __cond_resched+0x11/0x40 [ 303.363515][ T4318] ext4_alloc_file_blocks+0x271/0x720 [ 303.368912][ T4318] ext4_fallocate+0x2a7/0x4d0 [ 303.373639][ T4318] ? ext4_ext_truncate+0x170/0x170 [ 303.378749][ T4318] vfs_fallocate+0x463/0x660 [ 303.383437][ T4318] __x64_sys_fallocate+0x75/0xc0 05:03:37 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xe803, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:37 executing program 1: lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 303.388356][ T4318] do_syscall_64+0x4a/0x90 [ 303.392758][ T4318] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 303.398640][ T4318] RIP: 0033:0x4665f9 [ 303.402524][ T4318] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 303.422193][ T4318] RSP: 002b:00007f7b570ed188 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 303.430627][ T4318] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 05:03:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200013688000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x2b800, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:37 executing program 4 (fault-call:1 fault-nth:15): r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x0, 0x28120001) umount2(0x0, 0x0) 05:03:37 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 303.438599][ T4318] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000003 [ 303.446598][ T4318] RBP: 00007f7b570ed1d0 R08: 0000000000000000 R09: 0000000000000000 [ 303.454637][ T4318] R10: 0000000028120001 R11: 0000000000000246 R12: 0000000000000002 [ 303.462611][ T4318] R13: 00007ffd3f0d439f R14: 00007f7b570ed300 R15: 0000000000022000 [ 303.525656][ T4345] loop3: detected capacity change from 0 to 4 [ 303.536404][ T4345] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 303.560525][ T4350] loop5: detected capacity change from 0 to 4096 [ 303.563329][ T4354] FAULT_INJECTION: forcing a failure. [ 303.563329][ T4354] name failslab, interval 1, probability 0, space 0, times 0 [ 303.579503][ T4354] CPU: 0 PID: 4354 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 303.587870][ T4354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.597951][ T4354] Call Trace: [ 303.601231][ T4354] dump_stack+0x137/0x19d [ 303.605614][ T4354] should_fail+0x23c/0x250 [ 303.610036][ T4354] ? ext4_mb_new_blocks+0x2e7/0x1f90 [ 303.614525][ T4352] loop1: detected capacity change from 0 to 4096 [ 303.615363][ T4354] __should_failslab+0x81/0x90 [ 303.621887][ T4345] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 303.626445][ T4354] should_failslab+0x5/0x20 [ 303.626476][ T4354] kmem_cache_alloc+0x46/0x2f0 [ 303.645008][ T4354] ext4_mb_new_blocks+0x2e7/0x1f90 [ 303.650166][ T4354] ? ext4_find_extent+0x7b2/0x7f0 [ 303.655202][ T4354] ? ext4_ext_search_right+0x246/0x540 [ 303.660674][ T4354] ext4_ext_map_blocks+0x1569/0x1f00 [ 303.665968][ T4354] ? ext4_es_lookup_extent+0x36b/0x490 [ 303.671433][ T4354] ext4_map_blocks+0x70d/0xef0 [ 303.676255][ T4354] ? ext4_alloc_file_blocks+0x248/0x720 [ 303.681807][ T4354] ? __cond_resched+0x11/0x40 [ 303.686484][ T4354] ext4_alloc_file_blocks+0x271/0x720 [ 303.691885][ T4354] ext4_fallocate+0x2a7/0x4d0 [ 303.696569][ T4354] ? ext4_ext_truncate+0x170/0x170 [ 303.701688][ T4354] vfs_fallocate+0x463/0x660 [ 303.706341][ T4354] __x64_sys_fallocate+0x75/0xc0 [ 303.711343][ T4354] do_syscall_64+0x4a/0x90 [ 303.715922][ T4354] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 303.721892][ T4354] RIP: 0033:0x4665f9 [ 303.725801][ T4354] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 303.745435][ T4354] RSP: 002b:00007f7b570ed188 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 303.753857][ T4354] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 303.761835][ T4354] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000003 [ 303.769821][ T4354] RBP: 00007f7b570ed1d0 R08: 0000000000000000 R09: 0000000000000000 [ 303.777803][ T4354] R10: 0000000028120001 R11: 0000000000000246 R12: 0000000000000002 [ 303.785780][ T4354] R13: 00007ffd3f0d439f R14: 00007f7b570ed300 R15: 0000000000022000 05:03:37 executing program 4 (fault-call:1 fault-nth:16): r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x0, 0x28120001) umount2(0x0, 0x0) 05:03:37 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 303.820261][ T4350] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 303.842998][ T4350] EXT4-fs (loop5): mount failed [ 303.863054][ T4345] loop3: detected capacity change from 0 to 4 05:03:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x2c000, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 303.871167][ T4345] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 303.882080][ T4345] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 303.884718][ T4374] FAULT_INJECTION: forcing a failure. [ 303.884718][ T4374] name failslab, interval 1, probability 0, space 0, times 0 [ 303.904092][ T4374] CPU: 0 PID: 4374 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 303.912434][ T4374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.922491][ T4374] Call Trace: [ 303.925771][ T4374] dump_stack+0x137/0x19d [ 303.930103][ T4374] should_fail+0x23c/0x250 [ 303.934595][ T4374] ? ext4_mb_new_blocks+0x70f/0x1f90 [ 303.939881][ T4374] __should_failslab+0x81/0x90 [ 303.944725][ T4374] should_failslab+0x5/0x20 [ 303.949229][ T4374] kmem_cache_alloc+0x46/0x2f0 [ 303.954070][ T4374] ext4_mb_new_blocks+0x70f/0x1f90 [ 303.959184][ T4374] ? ext4_find_extent+0x7b2/0x7f0 [ 303.964214][ T4374] ? ext4_ext_search_right+0x246/0x540 [ 303.969679][ T4374] ext4_ext_map_blocks+0x1569/0x1f00 [ 303.974972][ T4374] ? ext4_es_lookup_extent+0x36b/0x490 [ 303.980571][ T4374] ext4_map_blocks+0x70d/0xef0 [ 303.985394][ T4374] ? ext4_alloc_file_blocks+0x248/0x720 [ 303.991113][ T4374] ? __cond_resched+0x11/0x40 [ 303.995822][ T4374] ext4_alloc_file_blocks+0x271/0x720 [ 304.001203][ T4374] ext4_fallocate+0x2a7/0x4d0 [ 304.005904][ T4374] ? ext4_ext_truncate+0x170/0x170 [ 304.011096][ T4374] vfs_fallocate+0x463/0x660 [ 304.015712][ T4374] __x64_sys_fallocate+0x75/0xc0 [ 304.020650][ T4374] do_syscall_64+0x4a/0x90 [ 304.025149][ T4374] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 304.031049][ T4374] RIP: 0033:0x4665f9 [ 304.034959][ T4374] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 304.054568][ T4374] RSP: 002b:00007f7b570ed188 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 304.063023][ T4374] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 05:03:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000006c8000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:38 executing program 4 (fault-call:1 fault-nth:17): r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x0, 0x28120001) umount2(0x0, 0x0) [ 304.071028][ T4374] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000003 [ 304.078993][ T4374] RBP: 00007f7b570ed1d0 R08: 0000000000000000 R09: 0000000000000000 [ 304.086960][ T4374] R10: 0000000028120001 R11: 0000000000000246 R12: 0000000000000002 [ 304.094964][ T4374] R13: 00007ffd3f0d439f R14: 00007f7b570ed300 R15: 0000000000022000 [ 304.203425][ T4391] loop1: detected capacity change from 0 to 4096 [ 304.203511][ T4392] loop3: detected capacity change from 0 to 4 [ 304.221816][ T4397] FAULT_INJECTION: forcing a failure. [ 304.221816][ T4397] name failslab, interval 1, probability 0, space 0, times 0 [ 304.229026][ T4392] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 304.234537][ T4397] CPU: 1 PID: 4397 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 304.252191][ T4397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.262249][ T4397] Call Trace: [ 304.265532][ T4397] dump_stack+0x137/0x19d [ 304.269872][ T4397] should_fail+0x23c/0x250 [ 304.274294][ T4397] ? ext4_mb_new_blocks+0x70f/0x1f90 [ 304.279588][ T4397] __should_failslab+0x81/0x90 [ 304.284433][ T4397] should_failslab+0x5/0x20 [ 304.288943][ T4397] kmem_cache_alloc+0x46/0x2f0 [ 304.293784][ T4397] ext4_mb_new_blocks+0x70f/0x1f90 [ 304.298943][ T4397] ? ext4_find_extent+0x7b2/0x7f0 [ 304.304042][ T4397] ? ext4_ext_search_right+0x246/0x540 [ 304.309558][ T4397] ext4_ext_map_blocks+0x1569/0x1f00 [ 304.314854][ T4397] ? ext4_es_lookup_extent+0x36b/0x490 [ 304.320321][ T4397] ext4_map_blocks+0x70d/0xef0 [ 304.325115][ T4397] ? ext4_alloc_file_blocks+0x248/0x720 [ 304.330685][ T4397] ? __cond_resched+0x11/0x40 [ 304.335396][ T4397] ext4_alloc_file_blocks+0x271/0x720 [ 304.340814][ T4397] ext4_fallocate+0x2a7/0x4d0 [ 304.345498][ T4397] ? ext4_ext_truncate+0x170/0x170 [ 304.350616][ T4397] vfs_fallocate+0x463/0x660 [ 304.355295][ T4397] __x64_sys_fallocate+0x75/0xc0 [ 304.360240][ T4397] do_syscall_64+0x4a/0x90 [ 304.364659][ T4397] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 304.370555][ T4397] RIP: 0033:0x4665f9 [ 304.374443][ T4397] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 304.394057][ T4397] RSP: 002b:00007f7b570ed188 EFLAGS: 00000246 ORIG_RAX: 000000000000011d 05:03:38 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xf401, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:38 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:03:38 executing program 4 (fault-call:1 fault-nth:18): r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x0, 0x28120001) umount2(0x0, 0x0) [ 304.402478][ T4397] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 304.410508][ T4397] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000003 [ 304.418501][ T4397] RBP: 00007f7b570ed1d0 R08: 0000000000000000 R09: 0000000000000000 [ 304.426481][ T4397] R10: 0000000028120001 R11: 0000000000000246 R12: 0000000000000002 [ 304.434511][ T4397] R13: 00007ffd3f0d439f R14: 00007f7b570ed300 R15: 0000000000022000 05:03:38 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 304.523710][ T4418] loop1: detected capacity change from 0 to 4096 [ 304.546545][ T4392] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 304.558814][ T4417] loop5: detected capacity change from 0 to 4096 [ 304.563350][ T4421] FAULT_INJECTION: forcing a failure. [ 304.563350][ T4421] name failslab, interval 1, probability 0, space 0, times 0 [ 304.577900][ T4421] CPU: 0 PID: 4421 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 304.586309][ T4421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.596372][ T4421] Call Trace: [ 304.599655][ T4421] dump_stack+0x137/0x19d [ 304.604101][ T4421] should_fail+0x23c/0x250 [ 304.608543][ T4421] ? kcalloc+0x32/0x50 [ 304.612610][ T4421] __should_failslab+0x81/0x90 [ 304.617380][ T4421] should_failslab+0x5/0x20 05:03:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x2c800, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 304.621893][ T4421] __kmalloc+0x66/0x340 [ 304.626059][ T4421] ? chksum_update+0x39/0x50 [ 304.630660][ T4421] kcalloc+0x32/0x50 [ 304.634640][ T4421] ext4_find_extent+0x21c/0x7f0 [ 304.639512][ T4421] ? __es_insert_extent+0xbf3/0xe70 [ 304.644750][ T4421] ext4_ext_map_blocks+0xd9/0x1f00 [ 304.649866][ T4421] ? __ext4_handle_dirty_metadata+0x20c/0x590 [ 304.655939][ T4421] ? ext4_inode_csum+0x3a6/0x430 [ 304.660905][ T4421] ? __down_write_common+0x45/0x890 [ 304.666105][ T4421] ? __brelse+0x2c/0x50 [ 304.670303][ T4421] ? percpu_counter_add_batch+0x69/0xd0 [ 304.671399][ T4417] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 304.675853][ T4421] ? ext4_es_lookup_extent+0x36b/0x490 [ 304.675883][ T4421] ext4_map_blocks+0x70d/0xef0 [ 304.675905][ T4421] ? ext4_alloc_file_blocks+0x248/0x720 [ 304.690196][ T4417] EXT4-fs (loop5): mount failed [ 304.695218][ T4421] ? __cond_resched+0x11/0x40 [ 304.695245][ T4421] ext4_alloc_file_blocks+0x271/0x720 05:03:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x2d000, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 304.720418][ T4421] ext4_fallocate+0x2a7/0x4d0 [ 304.725104][ T4421] ? ext4_ext_truncate+0x170/0x170 [ 304.730217][ T4421] vfs_fallocate+0x463/0x660 [ 304.734833][ T4421] __x64_sys_fallocate+0x75/0xc0 [ 304.739787][ T4421] do_syscall_64+0x4a/0x90 [ 304.744240][ T4421] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 304.750143][ T4421] RIP: 0033:0x4665f9 [ 304.754042][ T4421] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 05:03:38 executing program 4 (fault-call:1 fault-nth:19): r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x0, 0x28120001) umount2(0x0, 0x0) 05:03:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x2d800, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 304.773727][ T4421] RSP: 002b:00007f7b570ed188 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 304.782147][ T4421] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 304.790162][ T4421] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000003 [ 304.798139][ T4421] RBP: 00007f7b570ed1d0 R08: 0000000000000000 R09: 0000000000000000 [ 304.806112][ T4421] R10: 0000000028120001 R11: 0000000000000246 R12: 0000000000000002 [ 304.814091][ T4421] R13: 00007ffd3f0d439f R14: 00007f7b570ed300 R15: 0000000000022000 [ 304.896158][ T4392] loop3: detected capacity change from 0 to 4 [ 304.905896][ T4458] FAULT_INJECTION: forcing a failure. [ 304.905896][ T4458] name failslab, interval 1, probability 0, space 0, times 0 [ 304.918566][ T4458] CPU: 0 PID: 4458 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 304.926905][ T4458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.936969][ T4458] Call Trace: [ 304.940255][ T4458] dump_stack+0x137/0x19d [ 304.944693][ T4458] should_fail+0x23c/0x250 [ 304.949112][ T4458] ? ext4_mb_new_blocks+0x2e7/0x1f90 [ 304.954399][ T4458] __should_failslab+0x81/0x90 [ 304.959208][ T4458] should_failslab+0x5/0x20 [ 304.963731][ T4458] kmem_cache_alloc+0x46/0x2f0 [ 304.968513][ T4458] ext4_mb_new_blocks+0x2e7/0x1f90 [ 304.973626][ T4458] ? ext4_find_extent+0x7b2/0x7f0 [ 304.978670][ T4458] ? ext4_ext_search_right+0x246/0x540 [ 304.984142][ T4458] ext4_ext_map_blocks+0x1569/0x1f00 [ 304.989460][ T4458] ? ext4_es_lookup_extent+0x36b/0x490 [ 304.994997][ T4458] ext4_map_blocks+0x70d/0xef0 [ 304.999775][ T4458] ? ext4_alloc_file_blocks+0x248/0x720 [ 305.005384][ T4458] ? __cond_resched+0x11/0x40 [ 305.010063][ T4458] ext4_alloc_file_blocks+0x271/0x720 [ 305.015526][ T4458] ext4_fallocate+0x2a7/0x4d0 [ 305.020306][ T4458] ? ext4_ext_truncate+0x170/0x170 [ 305.025421][ T4458] vfs_fallocate+0x463/0x660 [ 305.030143][ T4458] __x64_sys_fallocate+0x75/0xc0 [ 305.035093][ T4458] do_syscall_64+0x4a/0x90 [ 305.039517][ T4458] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 305.045418][ T4458] RIP: 0033:0x4665f9 [ 305.049312][ T4458] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 305.068926][ T4458] RSP: 002b:00007f7b570ed188 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 305.077351][ T4458] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 305.085386][ T4458] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000003 05:03:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 305.093382][ T4458] RBP: 00007f7b570ed1d0 R08: 0000000000000000 R09: 0000000000000000 [ 305.101362][ T4458] R10: 0000000028120001 R11: 0000000000000246 R12: 0000000000000002 [ 305.109337][ T4458] R13: 00007ffd3f0d439f R14: 00007f7b570ed300 R15: 0000000000022000 [ 305.142804][ T4463] loop1: detected capacity change from 0 to 4096 [ 305.154226][ T4392] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 305.169620][ T4392] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000748000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:39 executing program 4 (fault-call:1 fault-nth:20): r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x0, 0x28120001) umount2(0x0, 0x0) [ 305.211854][ T4468] loop5: detected capacity change from 0 to 4096 [ 305.226275][ T4468] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 305.247267][ T4468] EXT4-fs (loop5): mount failed [ 305.269840][ T4481] FAULT_INJECTION: forcing a failure. [ 305.269840][ T4481] name failslab, interval 1, probability 0, space 0, times 0 [ 305.282632][ T4481] CPU: 0 PID: 4481 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 305.290975][ T4481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.291974][ T4482] loop3: detected capacity change from 0 to 4 [ 305.301047][ T4481] Call Trace: [ 305.301061][ T4481] dump_stack+0x137/0x19d [ 305.301089][ T4481] should_fail+0x23c/0x250 [ 305.315617][ T4482] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 305.319159][ T4481] ? ext4_mb_new_blocks+0x70f/0x1f90 [ 305.319186][ T4481] __should_failslab+0x81/0x90 [ 305.319210][ T4481] should_failslab+0x5/0x20 [ 305.330138][ T4482] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 305.333862][ T4481] kmem_cache_alloc+0x46/0x2f0 [ 305.357212][ T4481] ext4_mb_new_blocks+0x70f/0x1f90 [ 305.362327][ T4481] ? ext4_find_extent+0x7b2/0x7f0 [ 305.367393][ T4481] ? ext4_ext_search_right+0x246/0x540 [ 305.372970][ T4481] ext4_ext_map_blocks+0x1569/0x1f00 [ 305.378352][ T4481] ? ext4_es_lookup_extent+0x36b/0x490 [ 305.383822][ T4481] ext4_map_blocks+0x70d/0xef0 [ 305.388693][ T4481] ? ext4_alloc_file_blocks+0x248/0x720 [ 305.394224][ T4481] ? __cond_resched+0x11/0x40 [ 305.398963][ T4481] ext4_alloc_file_blocks+0x271/0x720 [ 305.404450][ T4481] ext4_fallocate+0x2a7/0x4d0 [ 305.409135][ T4481] ? ext4_ext_truncate+0x170/0x170 [ 305.414238][ T4481] vfs_fallocate+0x463/0x660 [ 305.418839][ T4481] __x64_sys_fallocate+0x75/0xc0 [ 305.423790][ T4481] do_syscall_64+0x4a/0x90 [ 305.428198][ T4481] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 305.434140][ T4481] RIP: 0033:0x4665f9 [ 305.438028][ T4481] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 305.457632][ T4481] RSP: 002b:00007f7b570ed188 EFLAGS: 00000246 ORIG_RAX: 000000000000011d 05:03:39 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:39 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:03:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x2e000, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a09", 0xb, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 305.466031][ T4481] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 305.473989][ T4481] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000003 [ 305.481953][ T4481] RBP: 00007f7b570ed1d0 R08: 0000000000000000 R09: 0000000000000000 [ 305.489982][ T4481] R10: 0000000028120001 R11: 0000000000000246 R12: 0000000000000002 [ 305.498046][ T4481] R13: 00007ffd3f0d439f R14: 00007f7b570ed300 R15: 0000000000022000 05:03:39 executing program 4 (fault-call:1 fault-nth:21): r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x0, 0x28120001) umount2(0x0, 0x0) 05:03:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x2e800, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 305.548326][ T4482] loop3: detected capacity change from 0 to 4 [ 305.555237][ T4482] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 305.565329][ T4482] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 305.590529][ T4494] loop1: detected capacity change from 0 to 4096 05:03:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000007a8000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:39 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 305.656110][ T4522] loop5: detected capacity change from 0 to 4096 05:03:39 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x0, 0x28120001) umount2(0x0, 0x0) [ 305.696206][ T4522] Quota error (device loop5): v2_read_file_info: Free block number too big (0 >= 0). [ 305.707806][ T4535] loop1: detected capacity change from 0 to 4096 [ 305.714536][ T4522] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 305.729202][ T4522] EXT4-fs (loop5): mount failed 05:03:39 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:03:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a09", 0xb, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 305.793273][ T4532] loop3: detected capacity change from 0 to 4 [ 305.819009][ T4532] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled 05:03:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x2f000, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 305.847958][ T4532] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 305.857753][ T4558] loop5: detected capacity change from 0 to 4096 [ 305.871489][ T4561] loop1: detected capacity change from 0 to 768 [ 305.882285][ T4558] Quota error (device loop5): v2_read_file_info: Free block number too big (0 >= 0). [ 305.898135][ T4558] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 305.912734][ T4561] EXT4-fs (loop1): bad geometry: block count 512 exceeds size of device (96 blocks) [ 305.928642][ T4558] EXT4-fs (loop5): mount failed [ 305.934832][ T4532] loop3: detected capacity change from 0 to 4 [ 305.947938][ T4532] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 305.957736][ T4532] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:40 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:40 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x2, 0x0, 0x28120001) umount2(0x0, 0x0) 05:03:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000f38000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:40 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:03:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a09", 0xb, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x2f800, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:40 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 306.476571][ T4601] loop1: detected capacity change from 0 to 768 [ 306.487396][ T4601] EXT4-fs (loop1): bad geometry: block count 512 exceeds size of device (96 blocks) [ 306.511407][ T4606] loop3: detected capacity change from 0 to 4 [ 306.517738][ T4607] loop5: detected capacity change from 0 to 4096 05:03:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000fffe8000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 306.528103][ T4606] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 306.537961][ T4606] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:40 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x3, 0x0, 0x28120001) umount2(0x0, 0x0) [ 306.586482][ T4607] Quota error (device loop5): v2_read_file_info: Free block number too big (0 >= 0). [ 306.596328][ T4607] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 306.611456][ T4607] EXT4-fs (loop5): mount failed 05:03:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900", 0x10, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:40 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 306.648681][ T4621] loop1: detected capacity change from 0 to 768 [ 306.662675][ T4621] EXT4-fs (loop1): bad geometry: block count 512 exceeds size of device (96 blocks) 05:03:40 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x4, 0x0, 0x28120001) umount2(0x0, 0x0) [ 306.701402][ T4633] loop3: detected capacity change from 0 to 4 [ 306.713207][ T4633] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 306.741829][ T4633] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 306.773799][ T4648] loop5: detected capacity change from 0 to 4096 [ 306.793106][ T4648] Quota error (device loop5): v2_read_file_info: Free block number too big (0 >= 0). [ 306.807981][ T4648] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 306.823492][ T4648] EXT4-fs (loop5): mount failed [ 306.831394][ T4633] loop3: detected capacity change from 0 to 4 [ 306.839712][ T4633] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 306.850051][ T4633] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:41 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:41 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:03:41 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x5, 0x0, 0x28120001) umount2(0x0, 0x0) 05:03:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x30000, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900", 0x10, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000fff8000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:41 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 307.365341][ T4686] loop5: detected capacity change from 0 to 4096 [ 307.369726][ T4689] loop3: detected capacity change from 0 to 4 [ 307.384116][ T4689] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 307.384775][ T4686] Quota error (device loop5): v2_read_file_info: Free block number too big (0 >= 0). [ 307.393698][ T4689] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:41 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x6, 0x0, 0x28120001) umount2(0x0, 0x0) 05:03:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000feff8000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:41 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x8, 0x0, 0x28120001) umount2(0x0, 0x0) 05:03:41 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 307.474933][ T4686] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 307.489391][ T4686] EXT4-fs (loop5): mount failed 05:03:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900", 0x10, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 307.545584][ T4715] loop1: detected capacity change from 0 to 4096 [ 307.565917][ T4720] loop3: detected capacity change from 0 to 4 [ 307.573299][ T4715] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 307.589637][ T4727] loop5: detected capacity change from 0 to 4096 [ 307.600962][ T4720] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 307.611685][ T4727] Quota error (device loop5): v2_read_file_info: Free block number too big (0 >= 0). [ 307.621988][ T4727] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 307.642785][ T4727] EXT4-fs (loop5): mount failed [ 307.645394][ T4715] EXT4-fs (loop1): mount failed [ 307.652894][ T4720] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 307.691529][ T4720] loop3: detected capacity change from 0 to 4 [ 307.723140][ T4720] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 307.734241][ T4720] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:42 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:42 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0xc, 0x0, 0x28120001) umount2(0x0, 0x0) 05:03:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900000000", 0x13, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:42 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:03:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x30800, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000080000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 308.244808][ T4763] loop5: detected capacity change from 0 to 4096 [ 308.274243][ T4763] Quota error (device loop5): v2_read_file_info: Free block number too big (0 >= 0). [ 308.283965][ T4772] loop1: detected capacity change from 0 to 4096 05:03:42 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0xd, 0x0, 0x28120001) umount2(0x0, 0x0) [ 308.291201][ T4763] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 308.291340][ T4768] loop3: detected capacity change from 0 to 4 [ 308.305532][ T4763] EXT4-fs (loop5): mount failed 05:03:42 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x10, 0x0, 0x28120001) umount2(0x0, 0x0) 05:03:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900000000", 0x13, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 308.346653][ T4772] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 308.369753][ T4768] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 308.374404][ T4772] EXT4-fs (loop1): mount failed 05:03:42 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 308.417718][ T4768] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) 05:03:42 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0xb0, 0x0, 0x28120001) umount2(0x0, 0x0) [ 308.472398][ T4798] loop5: detected capacity change from 0 to 4096 [ 308.497393][ T4798] Quota error (device loop5): v2_read_file_info: Free block number too big (0 >= 0). [ 308.514870][ T4768] loop3: detected capacity change from 0 to 4 [ 308.515812][ T4810] loop1: detected capacity change from 0 to 4096 [ 308.528048][ T4798] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 308.542758][ T4798] EXT4-fs (loop5): mount failed [ 308.543686][ T4768] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 308.558503][ T4768] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) 05:03:42 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x2a5, 0x0, 0x28120001) umount2(0x0, 0x0) [ 308.559025][ T4810] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 308.582646][ T4810] EXT4-fs (loop1): mount failed 05:03:42 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:42 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:03:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000a00000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:42 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x2c1, 0x0, 0x28120001) umount2(0x0, 0x0) 05:03:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900000000", 0x13, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x31000, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 309.127516][ T4848] loop1: detected capacity change from 0 to 4096 [ 309.128121][ T4850] loop3: detected capacity change from 0 to 4 [ 309.145286][ T4853] loop5: detected capacity change from 0 to 4096 [ 309.160035][ T4850] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled 05:03:43 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x300, 0x0, 0x28120001) umount2(0x0, 0x0) [ 309.178033][ T4853] Quota error (device loop5): v2_read_file_info: Free block number too big (0 >= 0). [ 309.190671][ T4853] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 309.192959][ T4850] EXT4-fs (loop3): bad geometry: block count 10 exceeds size of device (1 blocks) [ 309.205064][ T4853] EXT4-fs (loop5): mount failed [ 309.233232][ T4848] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 05:03:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a090000000000", 0x14, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:43 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x418, 0x0, 0x28120001) umount2(0x0, 0x0) 05:03:43 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:03:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006400000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 309.275392][ T4848] EXT4-fs (loop1): mount failed [ 309.281405][ T4850] loop3: detected capacity change from 0 to 4 [ 309.287983][ T4850] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 309.305123][ T4850] EXT4-fs (loop3): bad geometry: block count 10 exceeds size of device (1 blocks) 05:03:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x31800, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 309.361518][ T4889] loop5: detected capacity change from 0 to 4096 [ 309.385613][ T4896] loop1: detected capacity change from 0 to 4096 [ 309.421483][ T4896] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 309.437106][ T4889] Quota error (device loop5): v2_read_file_info: Free block number too big (0 >= 0). [ 309.447007][ T4889] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 309.450980][ T4911] loop3: detected capacity change from 0 to 4 [ 309.462367][ T4896] EXT4-fs (loop1): mount failed [ 309.474952][ T4889] EXT4-fs (loop5): mount failed [ 309.476213][ T4911] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 309.490008][ T4911] EXT4-fs (loop3): bad geometry: block count 100 exceeds size of device (1 blocks) [ 309.529551][ T4911] loop3: detected capacity change from 0 to 4 [ 309.536802][ T4911] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 309.551535][ T4911] EXT4-fs (loop3): bad geometry: block count 100 exceeds size of device (1 blocks) 05:03:43 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:43 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1f00, 0x0, 0x28120001) umount2(0x0, 0x0) 05:03:43 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:03:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a090000000000", 0x14, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x32000, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000028000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:43 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x2313, 0x0, 0x28120001) umount2(0x0, 0x0) [ 310.010546][ T4948] loop1: detected capacity change from 0 to 4096 [ 310.012506][ T4947] loop3: detected capacity change from 0 to 4 [ 310.023380][ T4946] loop5: detected capacity change from 0 to 4096 [ 310.034327][ T4948] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 05:03:44 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x231b, 0x0, 0x28120001) umount2(0x0, 0x0) [ 310.085439][ T4948] EXT4-fs (loop1): mount failed [ 310.088468][ T4947] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 310.101886][ T4946] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 310.112053][ T4947] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 310.125457][ T4946] EXT4-fs (loop5): mount failed 05:03:44 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x23d3, 0x0, 0x28120001) umount2(0x0, 0x0) 05:03:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a090000000000", 0x14, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:44 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 310.167708][ T4947] loop3: detected capacity change from 0 to 4 [ 310.185865][ T4947] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 310.223455][ T4947] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 310.261887][ T4996] loop1: detected capacity change from 0 to 4096 05:03:44 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 310.274798][ T4996] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 310.289462][ T4996] EXT4-fs (loop1): mount failed [ 310.295859][ T5001] loop5: detected capacity change from 0 to 4096 [ 310.338711][ T5001] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 310.364864][ T5001] EXT4-fs (loop5): mount failed [ 310.370373][ T5011] loop1: detected capacity change from 0 to 4096 [ 310.385729][ T5011] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 310.400039][ T5011] EXT4-fs (loop1): mount failed 05:03:44 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000038000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x32800, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:44 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x2423, 0x0, 0x28120001) umount2(0x0, 0x0) 05:03:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:44 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 310.879694][ T5041] loop1: detected capacity change from 0 to 4096 [ 310.888069][ T5039] loop5: detected capacity change from 0 to 4096 [ 310.899275][ T5043] loop3: detected capacity change from 0 to 4 [ 310.906383][ T5041] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 05:03:44 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x242b, 0x0, 0x28120001) umount2(0x0, 0x0) [ 310.932743][ T5039] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 310.947374][ T5039] EXT4-fs (loop5): mount failed [ 310.953209][ T5043] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 310.963253][ T5043] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 310.963454][ T5041] EXT4-fs (loop1): mount failed 05:03:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:44 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a09", 0xb, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 311.014402][ T5043] loop3: detected capacity change from 0 to 4 [ 311.030657][ T5043] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled 05:03:45 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x2433, 0x0, 0x28120001) umount2(0x0, 0x0) [ 311.088470][ T5043] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 311.098057][ T5078] loop5: detected capacity change from 0 to 4096 [ 311.115800][ T5080] loop1: detected capacity change from 0 to 4096 05:03:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 311.125253][ T5078] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 311.140104][ T5078] EXT4-fs (loop5): mount failed [ 311.158272][ T5080] __quota_error: 2 callbacks suppressed [ 311.158311][ T5080] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). 05:03:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000048000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 311.184001][ T5080] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 311.203235][ T5080] EXT4-fs (loop1): mount failed [ 311.255849][ T5109] loop5: detected capacity change from 0 to 4096 [ 311.266961][ T5110] loop3: detected capacity change from 0 to 4 [ 311.274856][ T5109] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 311.289111][ T5110] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 311.291312][ T5109] EXT4-fs (loop5): mount failed [ 311.299806][ T5110] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 311.366362][ T5110] loop3: detected capacity change from 0 to 4 [ 311.373097][ T5110] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 311.383495][ T5110] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:45 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:45 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x243b, 0x0, 0x28120001) umount2(0x0, 0x0) 05:03:45 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a09", 0xb, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:03:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x33000, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000058000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:45 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x2443, 0x0, 0x28120001) umount2(0x0, 0x0) [ 311.751273][ T5140] loop1: detected capacity change from 0 to 4096 [ 311.762484][ T5138] loop5: detected capacity change from 0 to 4096 [ 311.806316][ T5138] EXT4-fs error (device loop5): ext4_quota_enable:6432: comm syz-executor.5: Bad quota inode # 3 [ 311.817080][ T5138] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 311.831803][ T5145] loop3: detected capacity change from 0 to 4 [ 311.836785][ T5140] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). 05:03:45 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x244b, 0x0, 0x28120001) umount2(0x0, 0x0) [ 311.853454][ T5145] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 311.858944][ T5138] EXT4-fs (loop5): mount failed [ 311.873449][ T5140] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. 05:03:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 311.900173][ T5145] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 311.917914][ T5140] EXT4-fs (loop1): mount failed 05:03:45 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x2553, 0x0, 0x28120001) umount2(0x0, 0x0) [ 311.957987][ T5145] loop3: detected capacity change from 0 to 4 [ 311.973108][ T5145] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 311.982799][ T5145] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:45 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a09", 0xb, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:03:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000068000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 312.032288][ T5186] loop5: detected capacity change from 0 to 4096 [ 312.067439][ T5186] EXT4-fs error (device loop5): ext4_quota_enable:6432: comm syz-executor.5: Bad quota inode # 3 [ 312.078031][ T5186] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 312.092853][ T5186] EXT4-fs (loop5): mount failed [ 312.113608][ T5203] loop1: detected capacity change from 0 to 4096 [ 312.117814][ T5205] loop3: detected capacity change from 0 to 4 [ 312.127596][ T5205] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 312.138126][ T5205] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 312.156276][ T5203] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). [ 312.166189][ T5203] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 312.180644][ T5203] EXT4-fs (loop1): mount failed [ 312.190126][ T5205] loop3: detected capacity change from 0 to 4 [ 312.196831][ T5205] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 312.206770][ T5205] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:46 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xa000000, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:46 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x255b, 0x0, 0x28120001) umount2(0x0, 0x0) 05:03:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x33800, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:46 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900", 0x10, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:03:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000078000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:46 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x2563, 0x0, 0x28120001) umount2(0x0, 0x0) [ 312.634518][ T5241] loop3: detected capacity change from 0 to 4 [ 312.646680][ T5241] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 312.651127][ T5240] loop1: detected capacity change from 0 to 4096 [ 312.656683][ T5241] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 312.663609][ T5242] loop5: detected capacity change from 0 to 4096 [ 312.714621][ T5242] EXT4-fs error (device loop5): ext4_quota_enable:6432: comm syz-executor.5: Bad quota inode # 3 [ 312.725226][ T5242] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 312.740808][ T5240] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). [ 312.750916][ T5240] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. 05:03:46 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x256b, 0x0, 0x28120001) umount2(0x0, 0x0) 05:03:46 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900", 0x10, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 312.765600][ T5240] EXT4-fs (loop1): mount failed [ 312.783033][ T5241] loop3: detected capacity change from 0 to 4 [ 312.784243][ T5242] EXT4-fs (loop5): mount failed 05:03:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 312.810895][ T5241] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 312.834037][ T5241] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:46 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x2573, 0x0, 0x28120001) umount2(0x0, 0x0) 05:03:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000088000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 312.875143][ T5279] loop1: detected capacity change from 0 to 4096 [ 312.921198][ T5279] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). [ 312.936144][ T5292] loop5: detected capacity change from 0 to 4096 [ 312.943005][ T5279] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 312.958778][ T5292] EXT4-fs error (device loop5): ext4_quota_enable:6432: comm syz-executor.5: Bad quota inode # 3 [ 312.961802][ T5299] loop3: detected capacity change from 0 to 4 [ 312.969383][ T5292] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 312.976461][ T5299] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 312.999501][ T5299] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 313.015646][ T5279] EXT4-fs (loop1): mount failed [ 313.018698][ T5292] EXT4-fs (loop5): mount failed [ 313.072869][ T5299] loop3: detected capacity change from 0 to 4 [ 313.093312][ T5299] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 313.104879][ T5299] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:47 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xf000000, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:47 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x257b, 0x0, 0x28120001) umount2(0x0, 0x0) 05:03:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:47 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900", 0x10, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:03:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x34000, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000098000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 313.518524][ T5338] loop1: detected capacity change from 0 to 4096 [ 313.532035][ T5341] loop5: detected capacity change from 0 to 4096 [ 313.542603][ T5338] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). 05:03:47 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x2583, 0x0, 0x28120001) umount2(0x0, 0x0) [ 313.555379][ T5338] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 313.570502][ T5338] EXT4-fs (loop1): mount failed [ 313.577232][ T5348] loop3: detected capacity change from 0 to 4 [ 313.594793][ T5348] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled 05:03:47 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900000000", 0x13, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 313.614398][ T5341] EXT4-fs error (device loop5): ext4_quota_enable:6432: comm syz-executor.5: Bad quota inode # 3 [ 313.625147][ T5341] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 313.640942][ T5341] EXT4-fs (loop5): mount failed [ 313.646080][ T5348] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:47 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x258b, 0x0, 0x28120001) umount2(0x0, 0x0) 05:03:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 313.680306][ T5366] loop1: detected capacity change from 0 to 4096 [ 313.730216][ T5348] loop3: detected capacity change from 0 to 4 [ 313.744449][ T5348] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 313.757469][ T5366] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). 05:03:47 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x2593, 0x0, 0x28120001) umount2(0x0, 0x0) [ 313.776190][ T5366] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 313.796577][ T5348] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 313.808214][ T5366] EXT4-fs (loop1): mount failed [ 313.813568][ T5390] loop5: detected capacity change from 0 to 4096 [ 313.837649][ T5390] EXT4-fs error (device loop5): ext4_quota_enable:6432: comm syz-executor.5: Bad quota inode # 3 [ 313.848352][ T5390] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 05:03:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000a8000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 313.880787][ T5390] EXT4-fs (loop5): mount failed [ 313.956774][ T5418] loop3: detected capacity change from 0 to 4 [ 313.967750][ T5418] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 313.977389][ T5418] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 314.040316][ T5418] loop3: detected capacity change from 0 to 4 [ 314.046934][ T5418] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 314.057047][ T5418] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:48 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1a000000, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:48 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900000000", 0x13, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:03:48 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x259b, 0x0, 0x28120001) umount2(0x0, 0x0) 05:03:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x34800, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800), 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000b8000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 314.403667][ T5442] loop3: detected capacity change from 0 to 4 [ 314.413944][ T5440] loop1: detected capacity change from 0 to 4096 [ 314.420647][ T5445] loop5: detected capacity change from 0 to 4096 [ 314.426761][ T5442] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled 05:03:48 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x25a3, 0x0, 0x28120001) umount2(0x0, 0x0) [ 314.447194][ T5445] EXT4-fs error (device loop5): ext4_quota_enable:6432: comm syz-executor.5: Bad quota inode # 3 [ 314.455841][ T5442] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 314.457769][ T5445] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 314.482730][ T5440] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). 05:03:48 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900000000", 0x13, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 314.492636][ T5440] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 314.507777][ T5440] EXT4-fs (loop1): mount failed [ 314.525739][ T5445] EXT4-fs (loop5): mount failed 05:03:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800), 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 314.558984][ T5442] loop3: detected capacity change from 0 to 4 [ 314.568816][ T5442] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 314.579761][ T5442] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:48 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x25ab, 0x0, 0x28120001) umount2(0x0, 0x0) 05:03:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000c8000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 314.608982][ T5472] loop1: detected capacity change from 0 to 4096 [ 314.639431][ T5472] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). [ 314.656661][ T5486] loop3: detected capacity change from 0 to 4 [ 314.669072][ T5472] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 314.683583][ T5486] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 314.695180][ T5490] loop5: detected capacity change from 0 to 4096 05:03:48 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x25b3, 0x0, 0x28120001) umount2(0x0, 0x0) [ 314.695494][ T5486] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 314.710849][ T5472] EXT4-fs (loop1): mount failed [ 314.719543][ T5490] EXT4-fs error (device loop5): ext4_quota_enable:6432: comm syz-executor.5: Bad quota inode # 3 [ 314.730115][ T5490] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 314.748603][ T5490] EXT4-fs (loop5): mount failed [ 314.793274][ T5486] loop3: detected capacity change from 0 to 4 [ 314.807115][ T5486] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 314.825135][ T5486] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:49 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2e080000, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:49 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a090000000000", 0x14, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:03:49 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x25bb, 0x0, 0x28120001) umount2(0x0, 0x0) 05:03:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800), 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x35000, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000d8000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 315.309418][ T5531] loop3: detected capacity change from 0 to 4 [ 315.328929][ T5531] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 315.339169][ T5531] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 315.349017][ T5536] loop5: detected capacity change from 0 to 4096 05:03:49 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x25c3, 0x0, 0x28120001) umount2(0x0, 0x0) [ 315.368941][ T5537] loop1: detected capacity change from 0 to 4096 [ 315.386509][ T5537] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). [ 315.397423][ T5536] EXT4-fs error (device loop5): ext4_quota_enable:6432: comm syz-executor.5: Bad quota inode # 3 05:03:49 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a090000000000", 0x14, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 315.398996][ T5537] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 315.408037][ T5536] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 315.422390][ T5537] EXT4-fs (loop1): mount failed [ 315.445170][ T5531] loop3: detected capacity change from 0 to 4 [ 315.452565][ T5531] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled 05:03:49 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x25cb, 0x0, 0x28120001) umount2(0x0, 0x0) [ 315.467983][ T5531] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 315.483081][ T5536] EXT4-fs (loop5): mount failed 05:03:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000e8000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x35800, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 315.520918][ T5564] loop1: detected capacity change from 0 to 4096 [ 315.563778][ T5564] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 315.613052][ T5564] EXT4-fs (loop1): mount failed [ 315.614963][ T5582] loop5: detected capacity change from 0 to 4096 [ 315.637598][ T5585] loop3: detected capacity change from 0 to 4 [ 315.656764][ T5582] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 315.677337][ T5585] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 315.687979][ T5582] EXT4-fs (loop5): mount failed [ 315.692547][ T5585] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 315.751120][ T5585] loop3: detected capacity change from 0 to 4 [ 315.763065][ T5585] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 315.783648][ T5585] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:50 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x34000000, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:50 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x25d3, 0x0, 0x28120001) umount2(0x0, 0x0) 05:03:50 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a090000000000", 0x14, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:03:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x36000, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000f8000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 316.195976][ T5628] loop3: detected capacity change from 0 to 4 [ 316.207101][ T5632] loop1: detected capacity change from 0 to 4096 [ 316.220393][ T5628] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 316.229976][ T5634] loop5: detected capacity change from 0 to 4096 05:03:50 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x25db, 0x0, 0x28120001) umount2(0x0, 0x0) [ 316.248276][ T5632] __quota_error: 1 callbacks suppressed [ 316.248288][ T5632] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). [ 316.264278][ T5628] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 316.271137][ T5632] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. 05:03:50 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:03:50 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x25e3, 0x0, 0x28120001) umount2(0x0, 0x0) [ 316.276430][ T5634] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 316.288110][ T5632] EXT4-fs (loop1): mount failed [ 316.327361][ T5634] EXT4-fs (loop5): mount failed 05:03:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:50 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x25eb, 0x0, 0x28120001) umount2(0x0, 0x0) [ 316.358350][ T5628] loop3: detected capacity change from 0 to 4 [ 316.372905][ T5628] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 316.388613][ T5628] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000108000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 316.458643][ T5671] loop1: detected capacity change from 0 to 4096 [ 316.476229][ T5671] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 316.479582][ T5682] loop5: detected capacity change from 0 to 4096 [ 316.501931][ T5682] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 316.518463][ T5682] EXT4-fs (loop5): mount failed [ 316.537157][ T5671] EXT4-fs (loop1): mount failed [ 316.543121][ T5691] loop3: detected capacity change from 0 to 4 [ 316.554720][ T5691] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 316.564715][ T5691] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 316.603378][ T5691] loop3: detected capacity change from 0 to 4 [ 316.610071][ T5691] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 316.619871][ T5691] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:50 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x41020000, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x36800, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:50 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x25f3, 0x0, 0x28120001) umount2(0x0, 0x0) 05:03:50 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:03:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000118000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 317.070943][ T5722] loop5: detected capacity change from 0 to 4096 [ 317.084467][ T5726] loop1: detected capacity change from 0 to 4096 [ 317.091047][ T5725] loop3: detected capacity change from 0 to 4 05:03:51 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x25fb, 0x0, 0x28120001) umount2(0x0, 0x0) [ 317.105421][ T5722] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 317.107343][ T5725] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 317.123692][ T5722] EXT4-fs error (device loop5): ext4_quota_enable:6432: comm syz-executor.5: Bad quota inode # 3 [ 317.133513][ T5725] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 317.143762][ T5722] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 317.185573][ T5722] EXT4-fs (loop5): mount failed [ 317.204291][ T5725] loop3: detected capacity change from 0 to 4 05:03:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:51 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x8235, 0x0, 0x28120001) umount2(0x0, 0x0) [ 317.230507][ T5725] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 317.250070][ T5726] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 317.272241][ T5726] EXT4-fs (loop1): mount failed 05:03:51 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 317.274466][ T5757] loop5: detected capacity change from 0 to 4096 [ 317.283750][ T5725] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:51 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0xf100, 0x0, 0x28120001) umount2(0x0, 0x0) [ 317.322810][ T5757] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 317.341089][ T5757] EXT4-fs error (device loop5): ext4_quota_enable:6432: comm syz-executor.5: Bad quota inode # 3 [ 317.351653][ T5757] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. 05:03:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000128000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 317.376502][ T5770] loop1: detected capacity change from 0 to 4096 [ 317.409305][ T5770] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 317.422939][ T5757] EXT4-fs (loop5): mount failed [ 317.429675][ T5781] loop3: detected capacity change from 0 to 4 [ 317.433415][ T5770] EXT4-fs (loop1): mount failed [ 317.440470][ T5781] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 317.450301][ T5781] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 317.526272][ T5781] loop3: detected capacity change from 0 to 4 [ 317.544943][ T5781] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 317.555224][ T5781] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:51 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x5d010000, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x37000, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:51 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x2, 0x28120001) umount2(0x0, 0x0) 05:03:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:51 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:03:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000228000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 317.946742][ T5816] loop3: detected capacity change from 0 to 4 [ 317.953393][ T5815] loop1: detected capacity change from 0 to 4096 [ 317.960904][ T5817] loop5: detected capacity change from 0 to 4096 [ 317.986164][ T5816] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled 05:03:51 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x3, 0x28120001) umount2(0x0, 0x0) [ 317.996827][ T5815] EXT4-fs error (device loop1): ext4_quota_enable:6432: comm syz-executor.1: Bad quota inode # 3 [ 318.007393][ T5815] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 318.032406][ T5816] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 318.051057][ T5815] EXT4-fs (loop1): mount failed [ 318.066901][ T5817] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 318.085058][ T5817] EXT4-fs error (device loop5): ext4_quota_enable:6432: comm syz-executor.5: Bad quota inode # 3 05:03:52 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:03:52 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x4, 0x28120001) umount2(0x0, 0x0) 05:03:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x37800, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 318.095610][ T5817] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 318.110291][ T5817] EXT4-fs (loop5): mount failed [ 318.138976][ T5816] loop3: detected capacity change from 0 to 4 05:03:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 318.168472][ T5816] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 318.208021][ T5816] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x80000, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 318.217770][ T5858] loop1: detected capacity change from 0 to 4096 [ 318.242744][ T5858] EXT4-fs error (device loop1): ext4_quota_enable:6432: comm syz-executor.1: Bad quota inode # 3 [ 318.253426][ T5858] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 318.283638][ T5870] loop5: detected capacity change from 0 to 4096 [ 318.296708][ T5858] EXT4-fs (loop1): mount failed [ 318.306631][ T5870] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 318.324859][ T5870] EXT4-fs error (device loop5): ext4_quota_enable:6432: comm syz-executor.5: Bad quota inode # 3 [ 318.335417][ T5870] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 318.350568][ T5870] EXT4-fs (loop5): mount failed 05:03:52 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xe8030000, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000258000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:52 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x5, 0x28120001) umount2(0x0, 0x0) 05:03:52 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:03:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x80300, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 318.842827][ T5906] loop3: detected capacity change from 0 to 4 [ 318.849019][ T5907] loop5: detected capacity change from 0 to 4096 [ 318.849872][ T5910] loop1: detected capacity change from 0 to 4096 [ 318.875882][ T5906] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 318.894738][ T5910] EXT4-fs error (device loop1): ext4_quota_enable:6432: comm syz-executor.1: Bad quota inode # 3 [ 318.905346][ T5910] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 318.910021][ T5906] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:52 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x6, 0x28120001) umount2(0x0, 0x0) 05:03:52 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 318.921258][ T5907] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 318.946934][ T5907] EXT4-fs error (device loop5): ext4_quota_enable:6432: comm syz-executor.5: Bad quota inode # 3 [ 318.957479][ T5907] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 318.973918][ T5910] EXT4-fs (loop1): mount failed [ 318.979707][ T5907] EXT4-fs (loop5): mount failed 05:03:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 319.042158][ T5906] loop3: detected capacity change from 0 to 4 [ 319.051157][ T5906] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled 05:03:53 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x7, 0x28120001) umount2(0x0, 0x0) [ 319.083460][ T5906] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 319.095113][ T5941] loop1: detected capacity change from 0 to 4096 05:03:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000288000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:53 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x8, 0x28120001) umount2(0x0, 0x0) [ 319.186771][ T5949] loop5: detected capacity change from 0 to 4096 [ 319.226475][ T5949] EXT4-fs (loop5): Unrecognized mount option "system.posix_acl_access" or missing value [ 319.254720][ T5969] loop3: detected capacity change from 0 to 4 [ 319.266408][ T5969] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 319.276256][ T5969] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 319.337370][ T5969] loop3: detected capacity change from 0 to 4 [ 319.347724][ T5969] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 319.358138][ T5969] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:53 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xf4010000, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:53 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:03:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x100000, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:53 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0xc, 0x28120001) umount2(0x0, 0x0) 05:03:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000002e8000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 319.717799][ T6001] loop1: detected capacity change from 0 to 4096 [ 319.740112][ T6001] EXT4-fs error (device loop1): ext4_quota_enable:6432: comm syz-executor.1: Bad quota inode # 3 [ 319.742276][ T6006] loop3: detected capacity change from 0 to 4 [ 319.750715][ T6001] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 319.772800][ T6001] EXT4-fs (loop1): mount failed [ 319.780182][ T6011] loop5: detected capacity change from 0 to 4096 [ 319.781757][ T6006] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled 05:03:53 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0xd, 0x28120001) umount2(0x0, 0x0) [ 319.804535][ T6011] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 319.808801][ T6006] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 319.822814][ T6011] EXT4-fs error (device loop5): ext4_quota_enable:6432: comm syz-executor.5: Bad quota inode # 3 [ 319.842721][ T6011] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. 05:03:53 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 319.886011][ T6006] loop3: detected capacity change from 0 to 4 [ 319.907261][ T6011] EXT4-fs (loop5): mount failed [ 319.913894][ T6006] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 319.925835][ T6006] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x100200, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000488000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:53 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0xf, 0x28120001) umount2(0x0, 0x0) [ 319.988946][ T6036] loop1: detected capacity change from 0 to 4096 [ 320.063578][ T6055] loop3: detected capacity change from 0 to 4 [ 320.071658][ T6057] loop5: detected capacity change from 0 to 4096 [ 320.078465][ T6036] EXT4-fs error (device loop1): ext4_quota_enable:6432: comm syz-executor.1: Bad quota inode # 3 [ 320.089130][ T6036] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 320.104658][ T6055] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 320.121453][ T6055] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 320.127741][ T6036] EXT4-fs (loop1): mount failed [ 320.132372][ T6057] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 320.153983][ T6057] EXT4-fs error (device loop5): ext4_quota_enable:6432: comm syz-executor.5: Bad quota inode # 3 [ 320.164677][ T6057] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 320.179619][ T6057] EXT4-fs (loop5): mount failed [ 320.206800][ T6055] loop3: detected capacity change from 0 to 4 [ 320.213564][ T6055] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 320.223792][ T6055] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:54 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:54 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x10, 0x28120001) umount2(0x0, 0x0) 05:03:54 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800), 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:03:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000004c8000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x100300, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 320.594968][ T6100] loop5: detected capacity change from 0 to 4096 [ 320.602440][ T6102] loop3: detected capacity change from 0 to 4 [ 320.608635][ T6103] loop1: detected capacity change from 0 to 4096 [ 320.624706][ T6102] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 320.624863][ T6100] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 320.652309][ T6100] EXT4-fs error (device loop5): ext4_quota_enable:6432: comm syz-executor.5: Bad quota inode # 3 [ 320.662161][ T6102] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 320.662880][ T6100] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. 05:03:54 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x11, 0x28120001) umount2(0x0, 0x0) 05:03:54 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800), 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 320.684365][ T6103] EXT4-fs error (device loop1): ext4_quota_enable:6432: comm syz-executor.1: Bad quota inode # 3 [ 320.688166][ T6100] EXT4-fs (loop5): mount failed [ 320.696672][ T6103] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 320.717030][ T6103] EXT4-fs (loop1): mount failed 05:03:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 320.810197][ T6102] loop3: detected capacity change from 0 to 4 [ 320.816418][ T6134] loop1: detected capacity change from 0 to 4096 [ 320.818670][ T6102] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 320.833563][ T6134] EXT4-fs error (device loop1): ext4_quota_enable:6432: comm syz-executor.1: Bad quota inode # 3 [ 320.844143][ T6134] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 05:03:54 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800), 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 320.859853][ T6134] EXT4-fs (loop1): mount failed [ 320.881161][ T6102] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 320.893217][ T6142] loop5: detected capacity change from 0 to 4096 05:03:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x180000, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 320.939307][ T6142] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 320.957612][ T6142] EXT4-fs error (device loop5): ext4_quota_enable:6432: comm syz-executor.5: Bad quota inode # 3 [ 320.968196][ T6142] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 320.982654][ T6142] EXT4-fs (loop5): mount failed 05:03:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000608000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 320.987913][ T6149] loop1: detected capacity change from 0 to 4096 [ 321.006003][ T6149] EXT4-fs error (device loop1): ext4_quota_enable:6432: comm syz-executor.1: Bad quota inode # 3 [ 321.016576][ T6149] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 321.050513][ T6149] EXT4-fs (loop1): mount failed [ 321.068496][ T6167] loop3: detected capacity change from 0 to 4 [ 321.076261][ T6167] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 321.086641][ T6167] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 321.131203][ T6167] loop3: detected capacity change from 0 to 4 [ 321.152625][ T6167] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 321.162541][ T6167] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:55 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:55 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x12, 0x28120001) umount2(0x0, 0x0) 05:03:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:55 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:03:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x180200, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000688000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 321.479208][ T6199] loop1: detected capacity change from 0 to 4096 [ 321.491845][ T6197] loop3: detected capacity change from 0 to 4 [ 321.505525][ T6198] loop5: detected capacity change from 0 to 4096 [ 321.508767][ T6199] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 05:03:55 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 321.512111][ T6197] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 321.529985][ T6199] EXT4-fs (loop1): mount failed 05:03:55 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x18, 0x28120001) umount2(0x0, 0x0) [ 321.587647][ T6197] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 321.601621][ T6198] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 321.619863][ T6198] EXT4-fs error (device loop5): ext4_quota_enable:6432: comm syz-executor.5: Bad quota inode # 3 [ 321.630446][ T6198] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 321.650175][ T6219] loop1: detected capacity change from 0 to 4096 [ 321.659825][ T6198] EXT4-fs (loop5): mount failed 05:03:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 321.678635][ T6219] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 321.699852][ T6219] EXT4-fs (loop1): mount failed [ 321.718927][ T6197] loop3: detected capacity change from 0 to 4 05:03:55 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 321.741026][ T6197] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled 05:03:55 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x28, 0x28120001) umount2(0x0, 0x0) [ 321.785692][ T6197] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000006c8000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 321.834113][ T6247] loop5: detected capacity change from 0 to 4096 [ 321.843292][ T6246] loop1: detected capacity change from 0 to 4096 [ 321.876262][ T6247] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 321.894638][ T6247] EXT4-fs error (device loop5): ext4_quota_enable:6432: comm syz-executor.5: Bad quota inode # 3 [ 321.905199][ T6247] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 321.919853][ T6247] EXT4-fs (loop5): mount failed [ 321.929696][ T6265] loop3: detected capacity change from 0 to 4 [ 321.942183][ T6265] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 321.952079][ T6265] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 321.952666][ T6246] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 321.990624][ T6246] EXT4-fs (loop1): mount failed 05:03:56 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:56 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x30, 0x28120001) umount2(0x0, 0x0) 05:03:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x180300, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000748000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:56 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 322.386644][ T6291] loop5: detected capacity change from 0 to 4096 [ 322.393129][ T6293] loop3: detected capacity change from 0 to 4 [ 322.400068][ T6296] loop1: detected capacity change from 0 to 4096 [ 322.410701][ T6293] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 322.439766][ T6296] EXT4-fs error (device loop1): ext4_ext_check_inode:459: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 322.458195][ T6296] EXT4-fs error (device loop1): ext4_quota_enable:6432: comm syz-executor.1: Bad quota inode # 3 [ 322.469107][ T6296] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. 05:03:56 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x38, 0x28120001) umount2(0x0, 0x0) [ 322.494263][ T6293] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 322.507654][ T6296] EXT4-fs (loop1): mount failed [ 322.507754][ T6291] EXT4-fs error (device loop5): ext4_quota_enable:6432: comm syz-executor.5: Bad quota inode # 3 [ 322.523057][ T6291] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 322.547802][ T6291] EXT4-fs (loop5): mount failed 05:03:56 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:03:56 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x48, 0x28120001) umount2(0x0, 0x0) 05:03:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 322.572886][ T6293] loop3: detected capacity change from 0 to 4 [ 322.585804][ T6293] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 322.609525][ T6293] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000007a8000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 322.667617][ T6335] loop1: detected capacity change from 0 to 4096 [ 322.677205][ T6336] loop5: detected capacity change from 0 to 4096 [ 322.728541][ T6335] EXT4-fs error (device loop1): ext4_ext_check_inode:459: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 322.738724][ T6336] EXT4-fs error (device loop5): ext4_quota_enable:6432: comm syz-executor.5: Bad quota inode # 3 [ 322.746734][ T6335] EXT4-fs error (device loop1): ext4_quota_enable:6432: comm syz-executor.1: Bad quota inode # 3 05:03:56 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x50, 0x28120001) umount2(0x0, 0x0) [ 322.757251][ T6336] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 322.767853][ T6335] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 322.783784][ T6336] EXT4-fs (loop5): mount failed [ 322.813553][ T6335] EXT4-fs (loop1): mount failed [ 322.818508][ T6349] loop3: detected capacity change from 0 to 4 [ 322.837790][ T6349] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 322.858530][ T6349] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 322.915095][ T6349] loop3: detected capacity change from 0 to 4 [ 322.921720][ T6349] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 322.931506][ T6349] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:57 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:57 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:03:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x200000, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:57 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x58, 0x28120001) umount2(0x0, 0x0) 05:03:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000f38000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 323.275003][ T6391] loop5: detected capacity change from 0 to 4096 [ 323.299066][ T6392] loop3: detected capacity change from 0 to 4 [ 323.311190][ T6391] EXT4-fs error (device loop5): ext4_quota_enable:6432: comm syz-executor.5: Bad quota inode # 3 05:03:57 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x60, 0x28120001) umount2(0x0, 0x0) [ 323.321848][ T6391] EXT4-fs warning (device loop5): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 323.336185][ T6398] loop1: detected capacity change from 0 to 4096 [ 323.338230][ T6392] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 323.359737][ T6392] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 323.384117][ T6391] EXT4-fs (loop5): mount failed [ 323.400279][ T6398] EXT4-fs error (device loop1): ext4_ext_check_inode:459: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 323.418580][ T6398] EXT4-fs error (device loop1): ext4_quota_enable:6432: comm syz-executor.1: Bad quota inode # 3 05:03:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000fe8000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 323.429193][ T6398] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 323.445662][ T6398] EXT4-fs (loop1): mount failed 05:03:57 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x68, 0x28120001) umount2(0x0, 0x0) 05:03:57 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 323.525513][ T6424] loop5: detected capacity change from 0 to 4096 [ 323.539733][ T6425] loop3: detected capacity change from 0 to 4 [ 323.553727][ T6424] EXT4-fs error (device loop5): ext4_fill_super:4954: inode #2: comm syz-executor.5: iget: root inode unallocated [ 323.565890][ T6424] EXT4-fs (loop5): get root inode failed [ 323.571674][ T6424] EXT4-fs (loop5): mount failed [ 323.578192][ T6425] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 323.590397][ T6425] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 323.604561][ T6440] loop1: detected capacity change from 0 to 4096 [ 323.648271][ T6425] loop3: detected capacity change from 0 to 4 [ 323.655828][ T6425] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 323.666171][ T6425] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:03:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 323.684782][ T6440] EXT4-fs error (device loop1): ext4_ext_check_inode:459: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 323.702986][ T6440] EXT4-fs error (device loop1): ext4_quota_enable:6432: comm syz-executor.1: Bad quota inode # 3 [ 323.713555][ T6440] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 323.752748][ T6440] EXT4-fs (loop1): mount failed [ 323.764094][ T6464] loop5: detected capacity change from 0 to 4096 [ 323.780569][ T6464] EXT4-fs error (device loop5): ext4_fill_super:4954: inode #2: comm syz-executor.5: iget: root inode unallocated [ 323.792669][ T6464] EXT4-fs (loop5): get root inode failed [ 323.798336][ T6464] EXT4-fs (loop5): mount failed 05:03:58 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x200200, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:58 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x70, 0x28120001) umount2(0x0, 0x0) 05:03:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008f00000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:58 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:03:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 324.181001][ T6486] loop3: detected capacity change from 0 to 4 [ 324.198806][ T6490] loop5: detected capacity change from 0 to 4096 [ 324.201201][ T6489] loop1: detected capacity change from 0 to 4096 [ 324.206001][ T6486] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 324.226910][ T6489] EXT4-fs error (device loop1): ext4_ext_check_inode:459: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 324.245136][ T6489] EXT4-fs error (device loop1): ext4_quota_enable:6432: comm syz-executor.1: Bad quota inode # 3 [ 324.255713][ T6489] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 324.260195][ T6486] EXT4-fs (loop3): bad geometry: block count 143 exceeds size of device (1 blocks) 05:03:58 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:03:58 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x78, 0x28120001) umount2(0x0, 0x0) [ 324.270716][ T6489] EXT4-fs (loop1): mount failed [ 324.290497][ T6490] EXT4-fs error (device loop5): ext4_fill_super:4954: inode #2: comm syz-executor.5: iget: root inode unallocated [ 324.302645][ T6490] EXT4-fs (loop5): get root inode failed [ 324.308281][ T6490] EXT4-fs (loop5): mount failed 05:03:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 324.355144][ T6486] loop3: detected capacity change from 0 to 4 [ 324.366669][ T6486] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled 05:03:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x200300, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 324.409914][ T6486] EXT4-fs (loop3): bad geometry: block count 143 exceeds size of device (1 blocks) [ 324.440823][ T6526] loop1: detected capacity change from 0 to 4096 05:03:58 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x88, 0x28120001) umount2(0x0, 0x0) [ 324.472977][ T6529] loop5: detected capacity change from 0 to 4096 [ 324.509281][ T6529] EXT4-fs error (device loop5): ext4_fill_super:4954: inode #2: comm syz-executor.5: iget: root inode unallocated 05:03:58 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 324.521365][ T6529] EXT4-fs (loop5): get root inode failed [ 324.527004][ T6529] EXT4-fs (loop5): mount failed [ 324.560309][ T6548] loop1: detected capacity change from 0 to 4096 [ 324.584635][ T6548] EXT4-fs error (device loop1): ext4_ext_check_inode:459: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 324.603028][ T6548] EXT4-fs error (device loop1): ext4_quota_enable:6432: comm syz-executor.1: Bad quota inode # 3 [ 324.613583][ T6548] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 324.642200][ T6548] EXT4-fs (loop1): mount failed 05:03:58 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x300000000000000, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000a00000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:58 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x90, 0x28120001) umount2(0x0, 0x0) 05:03:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x280000, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:58 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 325.027312][ T6579] loop5: detected capacity change from 0 to 4096 [ 325.041580][ T6579] EXT4-fs error (device loop5): ext4_fill_super:4954: inode #2: comm syz-executor.5: iget: root inode unallocated [ 325.053662][ T6579] EXT4-fs (loop5): get root inode failed [ 325.059604][ T6579] EXT4-fs (loop5): mount failed [ 325.069459][ T6588] loop1: detected capacity change from 0 to 4096 [ 325.089115][ T6589] loop3: detected capacity change from 0 to 4 [ 325.108462][ T6588] EXT4-fs error (device loop1): ext4_ext_check_inode:459: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 325.126868][ T6588] EXT4-fs error (device loop1): ext4_quota_enable:6432: comm syz-executor.1: Bad quota inode # 3 05:03:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x280200, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:59 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x98, 0x28120001) umount2(0x0, 0x0) [ 325.137479][ T6588] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 325.170237][ T6588] EXT4-fs (loop1): mount failed 05:03:59 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 325.193384][ T6589] loop3: detected capacity change from 0 to 4 [ 325.225707][ T6589] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled 05:03:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 325.235837][ T6589] EXT4-fs (loop3): bad geometry: block count 10 exceeds size of device (1 blocks) [ 325.268258][ T6625] loop5: detected capacity change from 0 to 4096 [ 325.296838][ T6625] EXT4-fs error (device loop5): ext4_fill_super:4954: inode #2: comm syz-executor.5: iget: root inode unallocated [ 325.308974][ T6625] EXT4-fs (loop5): get root inode failed 05:03:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006400000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:59 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0xa0, 0x28120001) umount2(0x0, 0x0) [ 325.314618][ T6625] EXT4-fs (loop5): mount failed [ 325.326726][ T6630] loop1: detected capacity change from 0 to 4096 [ 325.336672][ T6642] loop3: detected capacity change from 0 to 4 [ 325.367402][ T6642] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 325.368428][ T6630] EXT4-fs error (device loop1): ext4_ext_check_inode:459: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 325.394979][ T6630] EXT4-fs error (device loop1): ext4_quota_enable:6432: comm syz-executor.1: Bad quota inode # 3 [ 325.405618][ T6630] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 325.420246][ T6630] EXT4-fs (loop1): mount failed [ 325.432911][ T6642] EXT4-fs (loop3): bad geometry: block count 100 exceeds size of device (1 blocks) [ 325.505162][ T6642] loop3: detected capacity change from 0 to 4 [ 325.511795][ T6642] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 325.522392][ T6642] EXT4-fs (loop3): bad geometry: block count 100 exceeds size of device (1 blocks) 05:03:59 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:03:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:03:59 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0xa8, 0x28120001) umount2(0x0, 0x0) 05:03:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x280300, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:03:59 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:03:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008f00000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 325.890793][ T6681] loop1: detected capacity change from 0 to 4096 [ 325.899487][ T6685] loop5: detected capacity change from 0 to 4096 [ 325.907098][ T6681] EXT4-fs error (device loop1): ext4_ext_check_inode:459: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 325.925378][ T6681] EXT4-fs error (device loop1): ext4_quota_enable:6432: comm syz-executor.1: Bad quota inode # 3 05:03:59 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0xb0, 0x28120001) umount2(0x0, 0x0) [ 325.935942][ T6681] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 325.945487][ T6684] loop3: detected capacity change from 0 to 4 [ 325.957646][ T6681] EXT4-fs (loop1): mount failed [ 325.959443][ T6685] EXT4-fs error (device loop5): ext4_fill_super:4954: inode #2: comm syz-executor.5: iget: root inode unallocated [ 325.974571][ T6685] EXT4-fs (loop5): get root inode failed [ 325.980251][ T6685] EXT4-fs (loop5): mount failed 05:03:59 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 325.991198][ T6684] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 326.002092][ T6684] EXT4-fs (loop3): bad geometry: block count 143 exceeds size of device (1 blocks) 05:03:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000ffe0f50506000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:03:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:04:00 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0xb8, 0x28120001) umount2(0x0, 0x0) [ 326.085670][ T6711] loop1: detected capacity change from 0 to 4096 [ 326.097525][ T6711] EXT4-fs error (device loop1): ext4_ext_check_inode:459: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 326.115702][ T6711] EXT4-fs error (device loop1): ext4_quota_enable:6432: comm syz-executor.1: Bad quota inode # 3 [ 326.126361][ T6711] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 326.150161][ T6724] loop3: detected capacity change from 0 to 4 [ 326.171735][ T6724] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled 05:04:00 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0xc0, 0x28120001) umount2(0x0, 0x0) [ 326.187929][ T6734] loop5: detected capacity change from 0 to 4096 [ 326.188080][ T6711] EXT4-fs (loop1): mount failed [ 326.202755][ T6724] EXT4-fs (loop3): bad geometry: block count 99999999 exceeds size of device (1 blocks) [ 326.252758][ T6724] loop3: detected capacity change from 0 to 4 [ 326.261902][ T6724] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 326.289547][ T6724] EXT4-fs (loop3): bad geometry: block count 99999999 exceeds size of device (1 blocks) 05:04:00 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:04:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x300000, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:04:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:04:00 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:04:00 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0xc8, 0x28120001) umount2(0x0, 0x0) 05:04:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000001000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 326.754819][ T6768] loop5: detected capacity change from 0 to 4096 [ 326.761461][ T6766] loop3: detected capacity change from 0 to 4 [ 326.776973][ T6766] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 326.792988][ T6773] loop1: detected capacity change from 0 to 4096 [ 326.799844][ T6768] EXT4-fs error (device loop5): ext4_fill_super:4954: inode #2: comm syz-executor.5: iget: root inode unallocated [ 326.809354][ T6766] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 326.811892][ T6768] EXT4-fs (loop5): get root inode failed [ 326.826938][ T6768] EXT4-fs (loop5): mount failed [ 326.848332][ T6773] EXT4-fs error (device loop1): ext4_ext_check_inode:459: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 326.866670][ T6773] EXT4-fs error (device loop1): ext4_quota_enable:6432: comm syz-executor.1: Bad quota inode # 3 [ 326.877275][ T6773] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 326.896184][ T6773] EXT4-fs (loop1): mount failed 05:04:00 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0xd0, 0x28120001) umount2(0x0, 0x0) 05:04:00 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:04:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655f", 0x10, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:04:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x300200, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 326.906670][ T6766] loop3: detected capacity change from 0 to 4 [ 326.913717][ T6766] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 326.935902][ T6766] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:04:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000005000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:04:00 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0xd8, 0x28120001) umount2(0x0, 0x0) [ 327.030661][ T6814] loop5: detected capacity change from 0 to 4096 [ 327.037263][ T6815] loop1: detected capacity change from 0 to 4096 [ 327.054383][ T6814] EXT4-fs error (device loop5): ext4_fill_super:4954: inode #2: comm syz-executor.5: iget: root inode unallocated [ 327.066588][ T6814] EXT4-fs (loop5): get root inode failed [ 327.072288][ T6814] EXT4-fs (loop5): mount failed [ 327.085841][ T6819] loop3: detected capacity change from 0 to 4 [ 327.093954][ T6815] EXT4-fs error (device loop1): ext4_quota_enable:6432: comm syz-executor.1: Bad quota inode # 3 [ 327.104610][ T6815] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 327.113997][ T6819] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 327.128394][ T6819] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 327.173666][ T6815] EXT4-fs (loop1): mount failed [ 327.197422][ T6819] loop3: detected capacity change from 0 to 4 [ 327.204182][ T6819] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 327.213817][ T6819] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 05:04:01 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xa00000000000000, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:04:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655f", 0x10, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:04:01 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0xe0, 0x28120001) umount2(0x0, 0x0) 05:04:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008002000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:04:01 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:04:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x300300, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 327.632605][ T6869] loop5: detected capacity change from 0 to 4096 [ 327.639837][ T6871] loop3: detected capacity change from 0 to 4 [ 327.641707][ T6872] loop1: detected capacity change from 0 to 4096 [ 327.652638][ T6871] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 327.664885][ T6869] EXT4-fs error (device loop5): ext4_fill_super:4954: inode #2: comm syz-executor.5: iget: root inode unallocated [ 327.677045][ T6869] EXT4-fs (loop5): get root inode failed [ 327.677155][ T6871] EXT4-fs (loop3): bad geometry: block count 640 exceeds size of device (1 blocks) [ 327.682875][ T6869] EXT4-fs (loop5): mount failed [ 327.693765][ T6872] EXT4-fs error (device loop1): ext4_quota_enable:6432: comm syz-executor.1: Bad quota inode # 3 [ 327.707726][ T6872] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 05:04:01 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0xe8, 0x28120001) umount2(0x0, 0x0) [ 327.732848][ T6872] EXT4-fs (loop1): mount failed 05:04:01 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:04:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655f", 0x10, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 327.794737][ T6871] loop3: detected capacity change from 0 to 4 [ 327.809912][ T6905] loop1: detected capacity change from 0 to 4096 [ 327.820506][ T6871] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled 05:04:01 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0xf0, 0x28120001) umount2(0x0, 0x0) 05:04:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x380000, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 327.842107][ T6871] EXT4-fs (loop3): bad geometry: block count 640 exceeds size of device (1 blocks) [ 327.852358][ T6905] EXT4-fs error (device loop1): ext4_quota_enable:6432: comm syz-executor.1: Bad quota inode # 3 [ 327.862975][ T6905] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 327.877507][ T6910] loop5: detected capacity change from 0 to 4096 [ 327.877646][ T6905] EXT4-fs (loop1): mount failed 05:04:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008003000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 328.005093][ T6927] loop3: detected capacity change from 0 to 4 [ 328.030200][ T6927] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 328.041879][ T6927] EXT4-fs (loop3): bad geometry: block count 896 exceeds size of device (1 blocks) [ 328.076698][ T6927] loop3: detected capacity change from 0 to 4 [ 328.087017][ T6927] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 328.096981][ T6927] EXT4-fs (loop3): bad geometry: block count 896 exceeds size of device (1 blocks) 05:04:02 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xf00000000000000, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:04:02 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:04:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000", 0x18, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:04:02 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0xf8, 0x28120001) umount2(0x0, 0x0) 05:04:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x380200, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:04:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008004000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 328.476515][ T6960] loop3: detected capacity change from 0 to 4 [ 328.484977][ T6960] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 328.486553][ T6963] loop5: detected capacity change from 0 to 4096 [ 328.501164][ T6964] loop1: detected capacity change from 0 to 4096 [ 328.501921][ T6960] EXT4-fs (loop3): bad geometry: block count 1152 exceeds size of device (1 blocks) 05:04:02 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x281, 0x28120001) umount2(0x0, 0x0) [ 328.526090][ T6964] EXT4-fs error (device loop1): ext4_fill_super:4954: inode #2: comm syz-executor.1: iget: root inode unallocated [ 328.538204][ T6964] EXT4-fs (loop1): get root inode failed [ 328.543882][ T6964] EXT4-fs (loop1): mount failed [ 328.550909][ T6963] EXT4-fs error (device loop5): ext4_fill_super:4954: inode #2: comm syz-executor.5: iget: root inode unallocated [ 328.562984][ T6963] EXT4-fs (loop5): get root inode failed [ 328.568659][ T6963] EXT4-fs (loop5): mount failed 05:04:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000", 0x18, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:04:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008005000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:04:02 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 328.584284][ T6960] loop3: detected capacity change from 0 to 4 [ 328.593289][ T6960] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 328.604103][ T6960] EXT4-fs (loop3): bad geometry: block count 1152 exceeds size of device (1 blocks) 05:04:02 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x300, 0x28120001) umount2(0x0, 0x0) [ 328.698150][ T6994] loop5: detected capacity change from 0 to 4096 [ 328.708590][ T7003] loop1: detected capacity change from 0 to 4096 [ 328.709823][ T7004] loop3: detected capacity change from 0 to 4 [ 328.730617][ T7003] EXT4-fs error (device loop1): ext4_fill_super:4954: inode #2: comm syz-executor.1: iget: root inode unallocated [ 328.742774][ T7003] EXT4-fs (loop1): get root inode failed 05:04:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000", 0x18, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 328.748482][ T7003] EXT4-fs (loop1): mount failed [ 328.757823][ T7004] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 328.799291][ T7004] EXT4-fs (loop3): bad geometry: block count 1408 exceeds size of device (1 blocks) [ 328.817805][ T7023] loop5: detected capacity change from 0 to 4096 [ 328.855782][ T7004] loop3: detected capacity change from 0 to 4 [ 328.862382][ T7004] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 328.872457][ T7004] EXT4-fs (loop3): bad geometry: block count 1408 exceeds size of device (1 blocks) 05:04:03 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1a00000000000000, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:04:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x380300, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:04:03 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:04:03 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x500, 0x28120001) umount2(0x0, 0x0) 05:04:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:04:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008006000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 329.313058][ T7044] loop5: detected capacity change from 0 to 4096 [ 329.326753][ T7044] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 329.333293][ T7048] loop1: detected capacity change from 0 to 4096 [ 329.343331][ T7044] EXT4-fs (loop5): mount failed [ 329.353426][ T7056] loop3: detected capacity change from 0 to 4 05:04:03 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x600, 0x28120001) umount2(0x0, 0x0) 05:04:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 329.376509][ T7048] EXT4-fs error (device loop1): ext4_fill_super:4954: inode #2: comm syz-executor.1: iget: root inode unallocated [ 329.376494][ T7056] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 329.388593][ T7048] EXT4-fs (loop1): get root inode failed [ 329.403704][ T7048] EXT4-fs (loop1): mount failed [ 329.403808][ T7056] EXT4-fs (loop3): bad geometry: block count 1664 exceeds size of device (1 blocks) 05:04:03 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 329.468578][ T7074] loop5: detected capacity change from 0 to 4096 [ 329.499231][ T7074] EXT4-fs (loop5): corrupt root inode, run e2fsck 05:04:03 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x700, 0x28120001) umount2(0x0, 0x0) [ 329.522685][ T7074] EXT4-fs (loop5): mount failed [ 329.528032][ T7056] loop3: detected capacity change from 0 to 4 [ 329.547881][ T7056] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 329.560952][ T7056] EXT4-fs (loop3): bad geometry: block count 1664 exceeds size of device (1 blocks) 05:04:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:04:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008007000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 329.592347][ T7094] loop1: detected capacity change from 0 to 4096 [ 329.605362][ T7094] EXT4-fs error (device loop1): ext4_fill_super:4954: inode #2: comm syz-executor.1: iget: root inode unallocated [ 329.617427][ T7094] EXT4-fs (loop1): get root inode failed [ 329.623083][ T7094] EXT4-fs (loop1): mount failed [ 329.632679][ T7106] loop5: detected capacity change from 0 to 4096 [ 329.669900][ T7106] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 329.682566][ T7106] EXT4-fs (loop5): mount failed [ 329.695659][ T7117] loop3: detected capacity change from 0 to 4 [ 329.703136][ T7117] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 329.713766][ T7117] EXT4-fs (loop3): bad geometry: block count 1920 exceeds size of device (1 blocks) [ 329.750831][ T1778] ================================================================== [ 329.758945][ T1778] BUG: KCSAN: data-race in mb_free_blocks / mb_update_avg_fragment_size [ 329.767284][ T1778] [ 329.769604][ T1778] write to 0xffff8881013e8494 of 4 bytes by task 1774 on cpu 1: [ 329.777245][ T1778] mb_free_blocks+0x156/0xb40 [ 329.781921][ T1778] ext4_free_blocks+0x1418/0x1b50 [ 329.786943][ T1778] ext4_remove_blocks+0x61a/0x800 [ 329.791964][ T1778] ext4_ext_rm_leaf+0x670/0xd20 [ 329.796828][ T1778] ext4_ext_remove_space+0x901/0x1300 [ 329.802206][ T1778] ext4_ext_truncate+0xfe/0x170 [ 329.807057][ T1778] ext4_truncate+0x76e/0xa80 [ 329.811639][ T1778] ext4_evict_inode+0xa54/0xdb0 [ 329.816488][ T1778] evict+0x1c8/0x3c0 [ 329.820379][ T1778] iput+0x433/0x590 [ 329.824181][ T1778] do_unlinkat+0x293/0x4f0 [ 329.828593][ T1778] __x64_sys_unlink+0x2c/0x30 [ 329.833274][ T1778] do_syscall_64+0x4a/0x90 [ 329.837716][ T1778] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 329.843613][ T1778] [ 329.845933][ T1778] read to 0xffff8881013e8494 of 4 bytes by task 1778 on cpu 0: [ 329.853467][ T1778] mb_update_avg_fragment_size+0x184/0x260 [ 329.859302][ T1778] mb_free_blocks+0x9e4/0xb40 [ 329.863997][ T1778] ext4_free_blocks+0x1418/0x1b50 [ 329.869049][ T1778] ext4_remove_blocks+0x61a/0x800 [ 329.874083][ T1778] ext4_ext_rm_leaf+0x670/0xd20 [ 329.878938][ T1778] ext4_ext_remove_space+0x901/0x1300 [ 329.884310][ T1778] ext4_ext_truncate+0xfe/0x170 [ 329.889173][ T1778] ext4_truncate+0x76e/0xa80 [ 329.893762][ T1778] ext4_evict_inode+0xa54/0xdb0 [ 329.898610][ T1778] evict+0x1c8/0x3c0 [ 329.902504][ T1778] iput+0x433/0x590 [ 329.906301][ T1778] dentry_unlink_inode+0x23a/0x260 [ 329.911417][ T1778] d_delete+0x78/0xe0 [ 329.915395][ T1778] vfs_rmdir+0x2a6/0x2c0 [ 329.919629][ T1778] do_rmdir+0x14a/0x2e0 [ 329.923774][ T1778] __x64_sys_rmdir+0x2c/0x30 [ 329.928351][ T1778] do_syscall_64+0x4a/0x90 [ 329.932763][ T1778] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 329.938672][ T1778] [ 329.940987][ T1778] Reported by Kernel Concurrency Sanitizer on: [ 329.947137][ T1778] CPU: 0 PID: 1778 Comm: syz-executor.5 Not tainted 5.12.0-syzkaller #0 [ 329.955461][ T1778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.965517][ T1778] ================================================================== [ 329.984488][ T7117] loop3: detected capacity change from 0 to 4 [ 329.994671][ T7117] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 330.004951][ T7117] EXT4-fs (loop3): bad geometry: block count 1920 exceeds size of device (1 blocks) 05:04:04 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2e08000000000000, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:04:04 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:04:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:04:04 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0xc00, 0x28120001) umount2(0x0, 0x0) 05:04:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x400000, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:04:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008008000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:04:04 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0xd00, 0x28120001) umount2(0x0, 0x0) [ 330.203795][ T7152] loop5: detected capacity change from 0 to 4096 [ 330.219448][ T7151] loop1: detected capacity change from 0 to 4096 [ 330.227766][ T7156] loop3: detected capacity change from 0 to 4 [ 330.237770][ T7152] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 05:04:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 330.261916][ T7156] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 330.277350][ T7151] EXT4-fs error (device loop1): ext4_fill_super:4954: inode #2: comm syz-executor.1: iget: root inode unallocated [ 330.289655][ T7151] EXT4-fs (loop1): get root inode failed [ 330.295308][ T7151] EXT4-fs (loop1): mount failed 05:04:04 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 330.310219][ T7156] EXT4-fs (loop3): bad geometry: block count 2176 exceeds size of device (1 blocks) 05:04:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 330.361353][ T7184] loop5: detected capacity change from 0 to 4096 [ 330.373480][ T7184] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 05:04:04 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0xf00, 0x28120001) umount2(0x0, 0x0) [ 330.407010][ T7189] loop1: detected capacity change from 0 to 4096 [ 330.416746][ T7156] loop3: detected capacity change from 0 to 4 [ 330.435801][ T7156] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled 05:04:04 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x1100, 0x28120001) umount2(0x0, 0x0) [ 330.445645][ T7189] EXT4-fs error (device loop1): ext4_fill_super:4954: inode #2: comm syz-executor.1: iget: root inode unallocated [ 330.457873][ T7189] EXT4-fs (loop1): get root inode failed [ 330.463567][ T7189] EXT4-fs (loop1): mount failed [ 330.481919][ T7156] EXT4-fs (loop3): bad geometry: block count 2176 exceeds size of device (1 blocks) [ 330.491655][ T7208] loop5: detected capacity change from 0 to 4096 [ 330.524142][ T7208] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 330.540829][ T7208] EXT4-fs (loop5): mount failed 05:04:04 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x3400000000000000, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:04:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x400200, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:04:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008009000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:04:04 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x1200, 0x28120001) umount2(0x0, 0x0) 05:04:04 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:04:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 331.090693][ T7243] loop1: detected capacity change from 0 to 4096 [ 331.102222][ T7244] loop5: detected capacity change from 0 to 4096 [ 331.115909][ T7254] ================================================================== [ 331.124023][ T7254] BUG: KCSAN: data-race in ext4_mb_find_by_goal / mb_mark_used [ 331.131601][ T7254] [ 331.133924][ T7254] write to 0xffff8881013e80d4 of 4 bytes by task 7248 on cpu 0: [ 331.139306][ T7245] loop3: detected capacity change from 0 to 4 [ 331.141556][ T7254] mb_mark_used+0x13b/0xc50 [ 331.141591][ T7254] ext4_mb_use_best_found+0x102/0x320 [ 331.157473][ T7254] ext4_mb_simple_scan_group+0x253/0x3a0 [ 331.163119][ T7254] ext4_mb_regular_allocator+0x1974/0x2520 [ 331.168934][ T7254] ext4_mb_new_blocks+0x762/0x1f90 [ 331.174057][ T7254] ext4_ext_map_blocks+0x1569/0x1f00 [ 331.176037][ T7245] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 331.179347][ T7254] ext4_map_blocks+0x70d/0xef0 [ 331.179370][ T7254] ext4_alloc_file_blocks+0x271/0x720 [ 331.179392][ T7254] ext4_fallocate+0x2a7/0x4d0 [ 331.203511][ T7254] vfs_fallocate+0x463/0x660 [ 331.208106][ T7254] __x64_sys_fallocate+0x75/0xc0 [ 331.213042][ T7254] do_syscall_64+0x4a/0x90 [ 331.217454][ T7254] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 331.223374][ T7254] [ 331.225687][ T7254] read to 0xffff8881013e80d4 of 4 bytes by task 7254 on cpu 1: [ 331.233234][ T7254] ext4_mb_find_by_goal+0x129/0x890 [ 331.238438][ T7254] ext4_mb_regular_allocator+0x11c/0x2520 [ 331.244166][ T7254] ext4_mb_new_blocks+0x762/0x1f90 [ 331.249281][ T7254] ext4_ext_map_blocks+0x1569/0x1f00 [ 331.254569][ T7254] ext4_map_blocks+0x70d/0xef0 [ 331.259333][ T7254] ext4_alloc_file_blocks+0x271/0x720 [ 331.264708][ T7254] ext4_fallocate+0x2a7/0x4d0 [ 331.269387][ T7254] vfs_fallocate+0x463/0x660 [ 331.273978][ T7254] __x64_sys_fallocate+0x75/0xc0 [ 331.278915][ T7254] do_syscall_64+0x4a/0x90 [ 331.283332][ T7254] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 331.289225][ T7254] [ 331.291538][ T7254] Reported by Kernel Concurrency Sanitizer on: [ 331.297674][ T7254] CPU: 1 PID: 7254 Comm: syz-executor.0 Not tainted 5.12.0-syzkaller #0 [ 331.306013][ T7254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 331.316073][ T7254] ================================================================== [ 331.329390][ T7243] EXT4-fs error (device loop1): ext4_fill_super:4954: inode #2: comm syz-executor.1: iget: root inode unallocated 05:04:05 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x17ff, 0x28120001) umount2(0x0, 0x0) [ 331.341466][ T7243] EXT4-fs (loop1): get root inode failed [ 331.347100][ T7243] EXT4-fs (loop1): mount failed [ 331.361903][ T7244] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 331.368390][ T7244] EXT4-fs (loop5): mount failed [ 331.386731][ T7245] EXT4-fs (loop3): bad geometry: block count 2432 exceeds size of device (1 blocks) 05:04:05 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:04:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 331.457301][ T7245] loop3: detected capacity change from 0 to 4 [ 331.488980][ T7245] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled 05:04:05 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x1800, 0x28120001) umount2(0x0, 0x0) [ 331.502555][ T7245] EXT4-fs (loop3): bad geometry: block count 2432 exceeds size of device (1 blocks) [ 331.503482][ T7285] loop1: detected capacity change from 0 to 4096 [ 331.525589][ T7283] loop5: detected capacity change from 0 to 4096 [ 331.540955][ T7285] EXT4-fs error (device loop1): ext4_fill_super:4954: inode #2: comm syz-executor.1: iget: root inode unallocated [ 331.553030][ T7285] EXT4-fs (loop1): get root inode failed [ 331.558668][ T7285] EXT4-fs (loop1): mount failed [ 331.569582][ T7283] EXT4-fs (loop5): corrupt root inode, run e2fsck 05:04:05 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x1fff, 0x28120001) umount2(0x0, 0x0) 05:04:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800a000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 331.608979][ T7283] EXT4-fs (loop5): mount failed [ 331.679013][ T7316] loop3: detected capacity change from 0 to 4 [ 331.692383][ T7316] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 331.702008][ T7316] EXT4-fs (loop3): bad geometry: block count 2688 exceeds size of device (1 blocks) [ 331.760154][ T7316] loop3: detected capacity change from 0 to 4 [ 331.770875][ T7316] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 331.780588][ T7316] EXT4-fs (loop3): bad geometry: block count 2688 exceeds size of device (1 blocks) 05:04:05 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x4102000000000000, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:04:05 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:04:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:04:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x400300, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:04:05 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x2000, 0x28120001) umount2(0x0, 0x0) 05:04:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800b000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 331.948652][ T7342] loop5: detected capacity change from 0 to 4096 [ 331.973413][ T7342] EXT4-fs error (device loop5): ext4_fill_super:4954: inode #2: comm syz-executor.5: iget: root inode unallocated [ 331.980193][ T7346] loop3: detected capacity change from 0 to 4 [ 331.985610][ T7342] EXT4-fs (loop5): get root inode failed 05:04:05 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x27ff, 0x28120001) umount2(0x0, 0x0) 05:04:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 331.996059][ T7346] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 331.997407][ T7342] EXT4-fs (loop5): mount failed [ 332.012087][ T7346] EXT4-fs (loop3): bad geometry: block count 2944 exceeds size of device (1 blocks) [ 332.019017][ T7349] loop1: detected capacity change from 0 to 4096 05:04:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x480000, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 332.109751][ T7349] EXT4-fs error (device loop1): ext4_fill_super:4954: inode #2: comm syz-executor.1: iget: root inode unallocated [ 332.121923][ T7349] EXT4-fs (loop1): get root inode failed [ 332.127607][ T7349] EXT4-fs (loop1): mount failed [ 332.132652][ T7346] loop3: detected capacity change from 0 to 4 [ 332.152704][ T7346] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 332.166782][ T7375] loop5: detected capacity change from 0 to 4096 [ 332.175987][ T7346] EXT4-fs (loop3): bad geometry: block count 2944 exceeds size of device (1 blocks) 05:04:06 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:04:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800c000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 332.209038][ T7375] EXT4-fs error (device loop5): ext4_fill_super:4954: inode #2: comm syz-executor.5: iget: root inode unallocated [ 332.221184][ T7375] EXT4-fs (loop5): get root inode failed [ 332.226823][ T7375] EXT4-fs (loop5): mount failed 05:04:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x480200, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 332.278983][ T7401] loop3: detected capacity change from 0 to 4 [ 332.295432][ T7401] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 332.299076][ T7403] loop1: detected capacity change from 0 to 4096 [ 332.315297][ T7401] EXT4-fs (loop3): bad geometry: block count 3200 exceeds size of device (1 blocks) [ 332.342707][ T7403] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 332.366523][ T7401] loop3: detected capacity change from 0 to 4 [ 332.373117][ T7401] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 332.383396][ T7401] EXT4-fs (loop3): bad geometry: block count 3200 exceeds size of device (1 blocks) 05:04:06 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x5d01000000000000, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:04:06 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x2800, 0x28120001) umount2(0x0, 0x0) 05:04:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:04:06 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:04:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800d000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:04:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x480300, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 332.799063][ T7440] loop3: detected capacity change from 0 to 4 [ 332.809158][ T7440] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 332.818691][ T7439] loop1: detected capacity change from 0 to 4096 [ 332.839343][ T7447] loop5: detected capacity change from 0 to 4096 05:04:06 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x2fff, 0x28120001) umount2(0x0, 0x0) [ 332.839380][ T7440] EXT4-fs (loop3): bad geometry: block count 3456 exceeds size of device (1 blocks) [ 332.870786][ T7439] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 05:04:06 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 332.889680][ T7447] EXT4-fs error (device loop5): ext4_fill_super:4954: inode #2: comm syz-executor.5: iget: root inode unallocated [ 332.901832][ T7447] EXT4-fs (loop5): get root inode failed [ 332.907495][ T7447] EXT4-fs (loop5): mount failed [ 332.930384][ T7440] loop3: detected capacity change from 0 to 4 [ 332.937997][ T7440] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled 05:04:06 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x3000, 0x28120001) umount2(0x0, 0x0) 05:04:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 332.959715][ T7440] EXT4-fs (loop3): bad geometry: block count 3456 exceeds size of device (1 blocks) 05:04:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800e000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:04:06 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400", 0x2e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 333.020675][ T7479] loop1: detected capacity change from 0 to 4096 [ 333.049416][ T7479] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 333.089473][ T7487] loop5: detected capacity change from 0 to 4096 [ 333.099480][ T7487] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 333.109269][ T7487] EXT4-fs (loop5): group descriptors corrupted! [ 333.142119][ T7499] loop3: detected capacity change from 0 to 4 [ 333.156816][ T7499] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 333.166476][ T7499] EXT4-fs (loop3): bad geometry: block count 3712 exceeds size of device (1 blocks) [ 333.176957][ T7505] loop1: detected capacity change from 0 to 4096 [ 333.190658][ T7505] EXT4-fs error (device loop1): ext4_ext_check_inode:459: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 333.208899][ T7505] EXT4-fs (loop1): get root inode failed [ 333.214547][ T7505] EXT4-fs (loop1): mount failed [ 333.249756][ T7499] loop3: detected capacity change from 0 to 4 [ 333.260853][ T7499] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 333.270732][ T7499] EXT4-fs (loop3): bad geometry: block count 3712 exceeds size of device (1 blocks) 05:04:07 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:04:07 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x3582, 0x28120001) umount2(0x0, 0x0) 05:04:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:04:07 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400", 0x2e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:04:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x500000, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:04:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800f000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 333.677438][ T7536] loop3: detected capacity change from 0 to 4 [ 333.688332][ T7536] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 333.698321][ T7536] EXT4-fs (loop3): bad geometry: block count 3968 exceeds size of device (1 blocks) [ 333.703671][ T7537] loop5: detected capacity change from 0 to 4096 [ 333.714221][ T7542] loop1: detected capacity change from 0 to 4096 05:04:07 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x37ff, 0x28120001) umount2(0x0, 0x0) 05:04:07 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400", 0x2e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 333.738477][ T7542] EXT4-fs error (device loop1): ext4_ext_check_inode:459: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 333.756818][ T7542] EXT4-fs (loop1): get root inode failed [ 333.757118][ T7537] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 333.762755][ T7542] EXT4-fs (loop1): mount failed [ 333.777353][ T7537] EXT4-fs (loop5): group descriptors corrupted! 05:04:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:04:07 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x3800, 0x28120001) umount2(0x0, 0x0) [ 333.823485][ T7536] loop3: detected capacity change from 0 to 4 [ 333.837323][ T7536] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 333.847554][ T7536] EXT4-fs (loop3): bad geometry: block count 3968 exceeds size of device (1 blocks) 05:04:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008010000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 333.920402][ T7572] loop5: detected capacity change from 0 to 4096 [ 333.926883][ T7573] loop1: detected capacity change from 0 to 4096 [ 333.941583][ T7572] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 333.951409][ T7572] EXT4-fs (loop5): group descriptors corrupted! 05:04:07 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x3f00, 0x28120001) umount2(0x0, 0x0) [ 333.958292][ T7573] EXT4-fs error (device loop1): ext4_ext_check_inode:459: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 333.975962][ T7588] loop3: detected capacity change from 0 to 4 [ 333.976447][ T7573] EXT4-fs (loop1): get root inode failed [ 333.988124][ T7573] EXT4-fs (loop1): mount failed [ 333.993293][ T7588] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 334.023591][ T7588] EXT4-fs (loop3): bad geometry: block count 4224 exceeds size of device (1 blocks) [ 334.077914][ T7588] loop3: detected capacity change from 0 to 4 [ 334.085272][ T7588] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 334.103016][ T7588] EXT4-fs (loop3): bad geometry: block count 4224 exceeds size of device (1 blocks) 05:04:08 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xe803000000000000, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:04:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:04:08 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af3010004000000000000000000", 0x36, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:04:08 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x3fff, 0x28120001) umount2(0x0, 0x0) 05:04:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x500200, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:04:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008011000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 334.551669][ T7627] loop5: detected capacity change from 0 to 4096 [ 334.561362][ T7627] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 334.571121][ T7627] EXT4-fs (loop5): group descriptors corrupted! [ 334.577409][ T7626] loop3: detected capacity change from 0 to 4 [ 334.587876][ T7634] loop1: detected capacity change from 0 to 4096 05:04:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 334.594544][ T7626] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 334.619478][ T7626] EXT4-fs (loop3): bad geometry: block count 4480 exceeds size of device (1 blocks) 05:04:08 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x4000, 0x28120001) umount2(0x0, 0x0) [ 334.656371][ T7634] EXT4-fs error (device loop1): ext4_ext_check_inode:459: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 334.674675][ T7634] EXT4-fs (loop1): get root inode failed [ 334.680349][ T7634] EXT4-fs (loop1): mount failed [ 334.698327][ T7640] loop5: detected capacity change from 0 to 4096 05:04:08 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af3010004000000000000000000", 0x36, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:04:08 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x47ff, 0x28120001) umount2(0x0, 0x0) [ 334.723546][ T7640] EXT4-fs (loop5): Unrecognized mount option "system.posix_acl_access" or missing value 05:04:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 334.764170][ T7626] loop3: detected capacity change from 0 to 4 [ 334.773703][ T7626] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 334.792486][ T7664] loop1: detected capacity change from 0 to 4096 [ 334.802288][ T7626] EXT4-fs (loop3): bad geometry: block count 4480 exceeds size of device (1 blocks) 05:04:08 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x4800, 0x28120001) umount2(0x0, 0x0) [ 334.918550][ T7685] loop5: detected capacity change from 0 to 4096 [ 334.933074][ T7685] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 334.942863][ T7685] EXT4-fs (loop5): group descriptors corrupted! 05:04:09 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xf401000000000000, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:04:09 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af3010004000000000000000000", 0x36, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:04:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008012000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:04:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:04:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x500300, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:04:09 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x4fff, 0x28120001) umount2(0x0, 0x0) 05:04:09 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x5000, 0x28120001) umount2(0x0, 0x0) [ 335.441795][ T7709] loop3: detected capacity change from 0 to 4 [ 335.454105][ T7709] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 335.463757][ T7709] EXT4-fs (loop3): bad geometry: block count 4736 exceeds size of device (1 blocks) [ 335.483415][ T7715] loop1: detected capacity change from 0 to 4096 [ 335.524067][ T7709] loop3: detected capacity change from 0 to 4 [ 335.531153][ T7715] EXT4-fs error (device loop1): ext4_ext_check_inode:459: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 335.532803][ T7717] loop5: detected capacity change from 0 to 4096 [ 335.549473][ T7715] EXT4-fs (loop1): get root inode failed [ 335.561391][ T7715] EXT4-fs (loop1): mount failed [ 335.570484][ T7709] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 335.581849][ T7717] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 335.590362][ T7709] EXT4-fs (loop3): bad geometry: block count 4736 exceeds size of device (1 blocks) [ 335.591655][ T7717] EXT4-fs (loop5): group descriptors corrupted! 05:04:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008022000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:04:09 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100", 0x3a, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:04:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:04:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x580000, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:04:09 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x57ff, 0x28120001) umount2(0x0, 0x0) [ 335.715275][ T7749] loop1: detected capacity change from 0 to 4096 [ 335.760926][ T7753] loop3: detected capacity change from 0 to 4 [ 335.767524][ T7757] loop5: detected capacity change from 0 to 4096 [ 335.783521][ T7757] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 335.793326][ T7757] EXT4-fs (loop5): group descriptors corrupted! [ 335.802831][ T7753] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 335.823992][ T7753] EXT4-fs (loop3): bad geometry: block count 8832 exceeds size of device (1 blocks) [ 335.856860][ T7753] loop3: detected capacity change from 0 to 4 [ 335.871902][ T7753] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 335.887524][ T7753] EXT4-fs (loop3): bad geometry: block count 8832 exceeds size of device (1 blocks) 05:04:10 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:04:10 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100", 0x3a, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:04:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:04:10 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x5800, 0x28120001) umount2(0x0, 0x0) 05:04:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x580200, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:04:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008025000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 336.323278][ T7802] loop1: detected capacity change from 0 to 4096 [ 336.330017][ T7800] loop3: detected capacity change from 0 to 4 [ 336.343312][ T7804] loop5: detected capacity change from 0 to 4096 [ 336.343402][ T7800] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled 05:04:10 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x5fff, 0x28120001) umount2(0x0, 0x0) [ 336.366499][ T7804] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 336.376450][ T7804] EXT4-fs (loop5): group descriptors corrupted! [ 336.383779][ T7802] EXT4-fs error (device loop1): ext4_ext_check_inode:459: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 336.388810][ T7800] EXT4-fs (loop3): bad geometry: block count 9600 exceeds size of device (1 blocks) [ 336.401984][ T7802] EXT4-fs (loop1): get root inode failed [ 336.417045][ T7802] EXT4-fs (loop1): mount failed 05:04:10 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100", 0x3a, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:04:10 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x6000, 0x28120001) umount2(0x0, 0x0) 05:04:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 336.498752][ T7829] loop1: detected capacity change from 0 to 4096 [ 336.514112][ T7800] loop3: detected capacity change from 0 to 4 [ 336.526764][ T7800] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 336.540568][ T7829] EXT4-fs error (device loop1): ext4_ext_check_inode:459: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 336.547992][ T7800] EXT4-fs (loop3): bad geometry: block count 9600 exceeds size of device (1 blocks) [ 336.558765][ T7829] EXT4-fs (loop1): get root inode failed [ 336.573809][ T7829] EXT4-fs (loop1): mount failed [ 336.601808][ T7842] loop5: detected capacity change from 0 to 4096 [ 336.639091][ T7842] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) 05:04:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008028000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:04:10 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x67ff, 0x28120001) umount2(0x0, 0x0) [ 336.648357][ T7842] EXT4-fs (loop5): group descriptors corrupted! [ 336.731755][ T7864] loop3: detected capacity change from 0 to 4 [ 336.742157][ T7864] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 336.763257][ T7864] EXT4-fs (loop3): bad geometry: block count 10368 exceeds size of device (1 blocks) [ 336.835879][ T7864] loop3: detected capacity change from 0 to 4 [ 336.842681][ T7864] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 336.854889][ T7864] EXT4-fs (loop3): bad geometry: block count 10368 exceeds size of device (1 blocks) 05:04:11 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:04:11 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af3010004000000000000000000000001000000", 0x3c, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:04:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:04:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x580300, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:04:11 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x6800, 0x28120001) umount2(0x0, 0x0) 05:04:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000802e000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 337.206613][ T7895] loop5: detected capacity change from 0 to 4096 [ 337.206657][ T7894] loop3: detected capacity change from 0 to 4 [ 337.219550][ T7899] loop1: detected capacity change from 0 to 4096 [ 337.229613][ T7895] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 337.239262][ T7895] EXT4-fs (loop5): group descriptors corrupted! 05:04:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:04:11 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x6fff, 0x28120001) umount2(0x0, 0x0) [ 337.251180][ T7899] EXT4-fs error (device loop1): ext4_ext_check_inode:459: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 337.269632][ T7899] EXT4-fs (loop1): get root inode failed [ 337.275459][ T7899] EXT4-fs (loop1): mount failed [ 337.281839][ T7894] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 337.292329][ T7894] EXT4-fs (loop3): bad geometry: block count 11904 exceeds size of device (1 blocks) 05:04:11 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af3010004000000000000000000000001000000", 0x3c, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 337.343518][ T7916] loop5: detected capacity change from 0 to 4096 [ 337.358287][ T7916] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 337.358998][ T7894] loop3: detected capacity change from 0 to 4 [ 337.367802][ T7916] EXT4-fs (loop5): group descriptors corrupted! 05:04:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:04:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008048000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 337.395334][ T7894] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 337.405975][ T7894] EXT4-fs (loop3): bad geometry: block count 11904 exceeds size of device (1 blocks) [ 337.466684][ T7931] loop1: detected capacity change from 0 to 4096 [ 337.496860][ T7931] EXT4-fs error (device loop1): ext4_ext_check_inode:459: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 05:04:11 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x7000, 0x28120001) umount2(0x0, 0x0) [ 337.501993][ T7943] loop3: detected capacity change from 0 to 4 [ 337.515612][ T7931] EXT4-fs (loop1): get root inode failed [ 337.524853][ T7943] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 337.527422][ T7931] EXT4-fs (loop1): mount failed [ 337.537598][ T7943] EXT4-fs (loop3): bad geometry: block count 18560 exceeds size of device (1 blocks) [ 337.603841][ T7946] loop5: detected capacity change from 0 to 4096 [ 337.604082][ T7943] loop3: detected capacity change from 0 to 4 [ 337.611922][ T7946] EXT4-fs (loop5): Unrecognized mount option "system.posix_acl_access" or missing value [ 337.623752][ T7943] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 337.636061][ T7943] EXT4-fs (loop3): bad geometry: block count 18560 exceeds size of device (1 blocks) 05:04:11 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:04:11 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af3010004000000000000000000000001000000", 0x3c, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:04:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:04:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x600000, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:04:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000804c000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:04:11 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x77ff, 0x28120001) umount2(0x0, 0x0) [ 338.074535][ T7981] loop1: detected capacity change from 0 to 4096 [ 338.091693][ T7981] EXT4-fs error (device loop1): ext4_ext_check_inode:459: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 338.109975][ T7981] EXT4-fs (loop1): get root inode failed [ 338.110218][ T7988] loop3: detected capacity change from 0 to 4 05:04:12 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:04:12 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) [ 338.115628][ T7981] EXT4-fs (loop1): mount failed [ 338.132928][ T7988] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 338.154425][ T7990] loop5: detected capacity change from 0 to 4096 05:04:12 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x7800, 0x28120001) umount2(0x0, 0x0) [ 338.180217][ T7990] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 338.189803][ T7990] EXT4-fs (loop5): group descriptors corrupted! [ 338.203131][ T7988] EXT4-fs (loop3): bad geometry: block count 19584 exceeds size of device (1 blocks) [ 338.224795][ T8003] loop1: detected capacity change from 0 to 4096 05:04:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 338.256374][ T7988] loop3: detected capacity change from 0 to 4 [ 338.270903][ T7988] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 338.294979][ T8003] EXT4-fs error (device loop1): ext4_fill_super:4954: inode #2: comm syz-executor.1: iget: root inode unallocated [ 338.303950][ T7988] EXT4-fs (loop3): bad geometry: block count 19584 exceeds size of device (1 blocks) [ 338.307148][ T8003] EXT4-fs (loop1): get root inode failed [ 338.322401][ T8003] EXT4-fs (loop1): mount failed 05:04:12 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x8102, 0x28120001) umount2(0x0, 0x0) 05:04:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008060000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:04:12 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 338.355270][ T8030] loop5: detected capacity change from 0 to 4096 [ 338.363513][ T8030] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 338.372895][ T8030] EXT4-fs (loop5): group descriptors corrupted! 05:04:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:04:12 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x8235, 0x28120001) umount2(0x0, 0x0) [ 338.469007][ T8046] loop3: detected capacity change from 0 to 4 [ 338.475866][ T8047] loop1: detected capacity change from 0 to 4096 [ 338.493220][ T8046] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 338.518331][ T8047] EXT4-fs error (device loop1): ext4_fill_super:4954: inode #2: comm syz-executor.1: iget: root inode unallocated [ 338.530614][ T8047] EXT4-fs (loop1): get root inode failed [ 338.536331][ T8047] EXT4-fs (loop1): mount failed [ 338.540639][ T8046] EXT4-fs (loop3): bad geometry: block count 24704 exceeds size of device (1 blocks) [ 338.552022][ T8063] loop5: detected capacity change from 0 to 4096 [ 338.565438][ T8063] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 338.575161][ T8063] EXT4-fs (loop5): group descriptors corrupted! [ 338.606514][ T8046] loop3: detected capacity change from 0 to 4 05:04:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x600200, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:04:12 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x87ff, 0x28120001) umount2(0x0, 0x0) 05:04:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:04:12 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 338.620713][ T8046] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 338.654659][ T8046] EXT4-fs (loop3): bad geometry: block count 24704 exceeds size of device (1 blocks) [ 338.727235][ T8093] loop1: detected capacity change from 0 to 4096 [ 338.739814][ T8095] loop5: detected capacity change from 0 to 4096 [ 338.751259][ T8093] EXT4-fs error (device loop1): ext4_fill_super:4954: inode #2: comm syz-executor.1: iget: root inode unallocated [ 338.763548][ T8093] EXT4-fs (loop1): get root inode failed [ 338.769328][ T8093] EXT4-fs (loop1): mount failed [ 338.780636][ T8095] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 338.790200][ T8095] EXT4-fs (loop5): group descriptors corrupted! 05:04:12 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x9, 0x2d, 0x0, "000000008000000000000000000000000000000000000000000000007ec5ddac2f0b52b100"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 05:04:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008068000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) 05:04:12 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x8800, 0x28120001) umount2(0x0, 0x0) 05:04:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r0, 0x1, 0x600300, 0x28120001) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socket$inet6(0xa, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 05:04:12 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) 05:04:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 339.083307][ T8130] loop3: detected capacity change from 0 to 4 [ 339.094440][ T8130] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 339.097236][ T8133] loop1: detected capacity change from 0 to 4096 [ 339.115160][ T8131] loop5: detected capacity change from 0 to 4096 05:04:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) 05:04:13 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x8fff, 0x28120001) umount2(0x0, 0x0) [ 339.124974][ T8133] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 339.134927][ T8133] EXT4-fs (loop1): group descriptors corrupted! [ 339.135750][ T8131] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 339.150776][ T8131] EXT4-fs (loop5): group descriptors corrupted! [ 339.161111][ T8130] EXT4-fs (loop3): bad geometry: block count 26752 exceeds size of device (1 blocks) 05:04:13 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x38240, 0x101) [ 339.233504][ T8130] loop3: detected capacity change from 0 to 4 [ 339.239880][ T8152] loop5: detected capacity change from 0 to 4096 [ 339.253717][ T8130] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 339.265098][ T8152] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 339.274643][ T8152] EXT4-fs (loop5): group descriptors corrupted! 05:04:13 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x9000, 0x28120001) umount2(0x0, 0x0) [ 339.281234][ T8130] EXT4-fs (loop3): bad geometry: block count 26752 exceeds size of device (1 blocks) [ 339.291512][ T8164] loop1: detected capacity change from 0 to 4096 [ 339.321123][ T8164] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 05:04:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000806c000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv0}]}) [ 339.330980][ T8164] EXT4-fs (loop1): group descriptors corrupted! 05:04:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f00000002c0)=""/152, 0x98) [ 339.417963][ T8184] loop3: detected capacity change from 0 to 4 [ 339.424253][ T8185] loop5: detected capacity change from 0 to 4096 [ 339.440570][ T8184] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 339.451031][ T8185] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 339.460513][ T8185] EXT4-fs (loop5): group descriptors corrupted! [ 339.472857][ T8184] EXT4-fs (loop3): bad geometry: block count 27776 exceeds size of device (1 blocks) [ 339.508998][ T8184] loop3: detected capacity change from 0 to 4 [ 339.528991][ T8184] EXT4-fs (loop3): Quota format mount options ignored when QUOTA feature is enabled [ 339.542180][ T8184] EXT4-fs (loop3): bad geometry: block count 27776 exceeds size of device (1 blocks)