, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000030000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f02ad00000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2529.676001][T26122] loop2: detected capacity change from 0 to 264192 [ 2529.694760][T26122] EXT4-fs (loop2): bad block size 8192 12:09:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000400000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:09:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f01be00000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:35 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f140000000000000000040000000000020000200000fe000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2529.817419][T26144] loop2: detected capacity change from 0 to 264192 [ 2529.847969][T26144] EXT4-fs (loop2): bad block size 16384 [ 2529.902758][T26144] loop2: detected capacity change from 0 to 264192 [ 2529.914576][T26144] EXT4-fs (loop2): bad block size 16384 12:09:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f02be00000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:36 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) getrlimit(0x3, &(0x7f0000000000)) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x401c5820, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) 12:09:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000500000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:09:36 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f140000000000000000040000000000020000200000feff0000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2530.200915][T26152] loop2: detected capacity change from 0 to 264192 [ 2530.220486][T26152] EXT4-fs (loop2): bad block size 32768 [ 2530.302594][T26152] loop2: detected capacity change from 0 to 264192 [ 2530.314401][T26152] EXT4-fs (loop2): bad block size 32768 12:09:36 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f6465762f6c6f6f703000a9a5f42477b34d11723b1eb09e8c9980d4a98524634198a32483f67272b62d36c28151df925f6926abf2743bc845996827a60319d78144c5a6ffd0ffa096e92c8d0fd13b09b503b194a9f7636019b6cad48180e8e34be37c1d9f6a48206dc779044d64f94df71372616221e81081b1f4adb6d7f2c97100d20fb48ac8747c6b7b0a2f1754b814c12be1fd576bb21e171904b51a31db2990"], &(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x1080400, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) mount(&(0x7f0000000000)=@filename='./bus\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='exfat\x00', 0x2000, &(0x7f0000000280)='\x00') ioctl$FS_IOC_RESVSP(r0, 0x401c5820, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x4, 0x10, r0, 0xc59e6000) 12:09:36 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x13, 0x0, 0x10000000009}) 12:09:36 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f140000000000000000040000000000020000200000feffffffddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000600000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:09:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f02cc00000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f01ce00000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:36 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020020000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2530.412881][T26167] loop2: detected capacity change from 0 to 264192 [ 2530.441377][T26167] EXT4-fs (loop2): bad block size 65536 12:09:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f01cf00000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:36 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020030000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2530.526083][T26167] loop2: detected capacity change from 0 to 264192 [ 2530.540678][T26167] EXT4-fs (loop2): bad block size 65536 12:09:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f01d600000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000700000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:09:36 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020040000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2530.907093][T26189] loop2: detected capacity change from 0 to 264192 [ 2530.937040][T26189] EXT4-fs (loop2): Invalid log block size: 7 12:09:36 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x401c5820, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) r1 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r1, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r1, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0x6, 0x0, 0x7, 0x2, 0x0, 0x61e4d8a3, 0x20, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, @perf_config_ext={0x6, 0x4}, 0x2, 0x1000, 0x100, 0x6, 0x2, 0x9, 0x0, 0x0, 0x5, 0x0, 0x100}, r1, 0x1, 0xffffffffffffffff, 0x4) 12:09:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f01d700000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:36 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) r1 = openat(r0, &(0x7f00000003c0)='./bus\x00', 0x40040, 0x40) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={0x0, {0x2, 0x4e23, @private=0xa010100}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e24, @loopback}, 0x6, 0x0, 0x0, 0x0, 0x100, &(0x7f0000000480)='batadv_slave_1\x00', 0x6, 0x0, 0x9}) mount_setattr(0xffffffffffffff9c, &(0x7f0000000400)='./bus\x00', 0x8000, &(0x7f0000000440)={0x1, 0x1, 0xd497c2efca59d2bc, {r1}}, 0x20) ioctl$FS_IOC_RESVSP(r0, 0x401c5820, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) rt_sigqueueinfo(r3, 0x33, &(0x7f0000000400)={0x0, 0x0, 0xfffffffffffffff9}) ptrace$getregset(0x4204, r3, 0x202, &(0x7f0000000100)={&(0x7f0000000000)=""/32, 0x20}) sched_setattr(r3, &(0x7f0000000540)={0x38, 0x5, 0x0, 0x7, 0xffff, 0x1, 0x0, 0x13d, 0x3, 0x4000}, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000200)={0x53, 0xfffffffffffffffc, 0x70, 0xed, @scatter={0x1, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/109, 0x6d}]}, &(0x7f0000000180)="1ba93b7d8f1c784dbcb11a56548d28a7d6063e3720cbdb0374f2c4933c9cf5f34288fbf62db811f60bd9c53e6cd3d9c3bf8d94f824a40958b0ec9c4f03f78b80f16541c31ef274dd0fd1b1634fd8bb347acf03949bc89196cd685051baf3942a26bd165f1a2be7f24b6f2b8d0cf961dd", &(0x7f00000002c0)=""/212, 0x0, 0x13, 0x3, &(0x7f0000000080)}) 12:09:36 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020050000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:36 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x14, 0x0, 0x10000000009}) [ 2531.043805][T26189] loop2: detected capacity change from 0 to 264192 [ 2531.056149][T26189] EXT4-fs (loop2): Invalid log block size: 7 12:09:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000fc0ed00000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:37 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020060000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000800000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:09:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f03f200000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2531.176586][T26211] loop2: detected capacity change from 0 to 264192 12:09:37 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020070000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2531.227626][T26211] EXT4-fs (loop2): Invalid log block size: 8 12:09:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f03fc00000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:37 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020080000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2531.343959][T26211] loop2: detected capacity change from 0 to 264192 [ 2531.371932][T26211] EXT4-fs (loop2): Invalid log block size: 8 12:09:37 executing program 3: r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40086602, &(0x7f00000000c0)) sched_setattr(r0, &(0x7f0000000080)={0x38, 0x6, 0x2, 0x2, 0x1e2, 0x9, 0x0, 0x10000, 0x5}, 0x0) fsopen(&(0x7f0000000100)='proc\x00', 0x0) 12:09:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000ffffe00000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:37 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020180000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000900000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:09:37 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x15, 0x0, 0x10000000009}) 12:09:37 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) setrlimit(0x8, &(0x7f0000000080)={0x0, 0x3}) syz_open_dev$sg(&(0x7f0000000000), 0x10000, 0x40000) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) r1 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r1, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r1, 0x8918, &(0x7f00000000c0)={0x0, @generic={0x10, "e5acfacbcb52687de3339989b760"}, @in={0x2, 0x0, @broadcast}, @xdp}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000002c0)={0x0, 0xfffffffffffffffc, 0xaa, 0x1, @buffer={0x0, 0x3a, &(0x7f0000000100)=""/58}, &(0x7f0000000140)="b43cffad395120ee2d75058c57b86511cd178a8e3b978375e6b454283ac401f8ffa4835ce8e4f21b3e7f0178c4a82054d51010954fd9c128508f28e6018c3c4b4af07041f1e79817b3071ee0173657e611f0531fc90e25347916c3a3ce1475e8a6a4122607aa1b6e754822ef783fcd0a284d4fa3173c3f2b2785d05b8b543e01a20089de42f9a626fff275627d5e831ffddea4a3f5737b60de4fbc1fc52bdea6dfcde36cd61af32a173c", &(0x7f0000000200)=""/57, 0x80000001, 0x10004, 0x0, &(0x7f0000000240)}) ioctl$FS_IOC_RESVSP(r0, 0x401c5820, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) syz_open_dev$sg(&(0x7f0000000340), 0x3, 0x180) socket$inet6(0xa, 0x3, 0x8) [ 2531.804828][T26232] loop2: detected capacity change from 0 to 264192 12:09:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f0fff00000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:37 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020260000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2531.853376][T26232] EXT4-fs (loop2): Invalid log block size: 9 12:09:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000ffeff00000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:37 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f140000000000000000040000000000020000200000207e0000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2531.904682][T26232] loop2: detected capacity change from 0 to 264192 [ 2531.931754][T26232] EXT4-fs (loop2): Invalid log block size: 9 12:09:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000002000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:37 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020840000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:38 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x401c5820, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009, 0xfffffdfd}) 12:09:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000a00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:09:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000fffff03000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:38 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020fe0000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:38 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x1d9) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x401c5820, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) 12:09:38 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x16, 0x0, 0x10000000009}) 12:09:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000004000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2532.533225][T26266] loop2: detected capacity change from 0 to 264192 [ 2532.554168][T26266] EXT4-fs (loop2): Invalid log block size: 10 12:09:38 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020040200ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000008000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:38 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000300ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2532.632582][T26266] loop2: detected capacity change from 0 to 264192 [ 2532.658239][T26266] EXT4-fs (loop2): Invalid log block size: 10 12:09:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000b00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:09:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f400008000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2532.763457][T26291] loop2: detected capacity change from 0 to 264192 [ 2532.792857][T26291] EXT4-fs (loop2): Invalid log block size: 11 [ 2532.853348][T26291] loop2: detected capacity change from 0 to 264192 [ 2532.864218][T26291] EXT4-fs (loop2): Invalid log block size: 11 12:09:39 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x4600, 0x0, 0x0, 0x10000000009}) 12:09:39 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020020400ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f00000c000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000c00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:09:39 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f00000002c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f0000000040)) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000100), 0x20000, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000080)=ANY=[@ANYRESOCT=r0, @ANYRES16, @ANYRESOCT=r2], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x401c5820, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) 12:09:39 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x17, 0x0, 0x10000000009}) 12:09:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000018000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2533.288155][T26298] loop2: detected capacity change from 0 to 264192 [ 2533.312066][T26298] EXT4-fs (loop2): Invalid log block size: 12 12:09:39 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x401c5820, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) sched_setattr(0xffffffffffffffff, &(0x7f0000000000)={0x38, 0x2, 0x1b, 0xfffffff7, 0x2, 0x7fff, 0x1, 0xa2f, 0x6, 0x7f}, 0x0) 12:09:39 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020060400ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000010000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2533.352988][T26298] loop2: detected capacity change from 0 to 264192 [ 2533.377820][T26298] EXT4-fs (loop2): Invalid log block size: 12 12:09:39 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000500ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000020000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:39 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x401c5820, &(0x7f00000000c0)={0x0, 0x0, 0xfffffffb, 0x10000000009}) 12:09:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000d00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:09:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000004020000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:39 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000600ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:39 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x18, 0x0, 0x10000000009}) 12:09:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000030000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:39 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x401c5820, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) open(&(0x7f0000000080)='./bus\x00', 0x2, 0x70) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f0000000040)) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0xd909a43f2e3fac39, 0x30, r1, 0xd3ae1000) 12:09:39 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020040600ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2533.944418][T26330] loop2: detected capacity change from 0 to 264192 [ 2533.976335][T26330] EXT4-fs (loop2): Invalid log block size: 13 12:09:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000040000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:39 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000700ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000004040000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2534.053338][T26330] loop2: detected capacity change from 0 to 264192 [ 2534.070551][T26330] EXT4-fs (loop2): Invalid log block size: 13 12:09:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000f00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) [ 2534.185756][T26357] loop2: detected capacity change from 0 to 264192 [ 2534.208887][T26357] EXT4-fs (loop2): Invalid log block size: 15 [ 2534.252927][T26357] loop2: detected capacity change from 0 to 264192 [ 2534.262682][T26357] EXT4-fs (loop2): Invalid log block size: 15 12:09:40 executing program 3: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000008000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:40 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020001800ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000050000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000001000000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:09:40 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x19, 0x0, 0x10000000009}) 12:09:40 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020002600ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:40 executing program 0: prlimit64(0x0, 0x8, &(0x7f0000000280)={0x800002, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x401c5820, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) 12:09:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000060000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2534.593644][T26363] loop2: detected capacity change from 0 to 264192 [ 2534.613091][T26363] EXT4-fs (loop2): Invalid log block size: 16 12:09:40 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020003f00ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000004060000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2534.676920][T26363] loop2: detected capacity change from 0 to 264192 [ 2534.688954][T26363] EXT4-fs (loop2): Invalid log block size: 16 12:09:40 executing program 3: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f1400000000fe00000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000001100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:09:40 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020004000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000070000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:40 executing program 3: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000600000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000008070000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2534.818669][T26389] loop2: detected capacity change from 0 to 264192 [ 2534.854972][T26389] EXT4-fs (loop2): Invalid log block size: 17 [ 2534.922856][T26389] loop2: detected capacity change from 0 to 264192 [ 2534.932775][T26389] EXT4-fs (loop2): Invalid log block size: 17 12:09:41 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x1a, 0x0, 0x10000000009}) 12:09:41 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020007e00ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:41 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) setrlimit(0x9, &(0x7f0000000000)={0x3, 0x2}) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x401c5820, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) 12:09:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000080000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:41 executing program 3: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000fffffff60004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000001200000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:09:41 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020008400ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000008080000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:41 executing program 3: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000fffffff60004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2535.247284][T26406] loop2: detected capacity change from 0 to 264192 [ 2535.282484][T26406] EXT4-fs (loop2): Invalid log block size: 18 12:09:41 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020fffe00ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000090000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:41 executing program 3: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000040000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2535.322834][T26406] loop2: detected capacity change from 0 to 264192 [ 2535.352191][T26406] EXT4-fs (loop2): Invalid log block size: 18 12:09:41 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x1b, 0x0, 0x10000000009}) 12:09:41 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020feff00ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:41 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) sched_setattr(0xffffffffffffffff, &(0x7f0000000000)={0x38, 0x3, 0x4, 0x5, 0x0, 0x81, 0x100000000, 0x100, 0xfffffffa, 0x6}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x401c5820, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) 12:09:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f0000000a0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000001400000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:09:41 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) (fail_nth: 1) 12:09:41 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000200ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f0000000b0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2535.774856][T26436] loop2: detected capacity change from 0 to 264192 [ 2535.798084][T26436] EXT4-fs (loop2): Invalid log block size: 20 [ 2535.839675][T26447] FAULT_INJECTION: forcing a failure. [ 2535.839675][T26447] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2535.852832][T26447] CPU: 0 PID: 26447 Comm: syz-executor.3 Not tainted 5.15.0-rc7-syzkaller #0 [ 2535.861594][T26447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2535.871803][T26447] Call Trace: [ 2535.875136][T26447] dump_stack_lvl+0xd6/0x122 [ 2535.879864][T26447] dump_stack+0x11/0x1b [ 2535.884028][T26447] should_fail+0x23c/0x250 [ 2535.888439][T26447] should_fail_usercopy+0x16/0x20 [ 2535.893476][T26447] _copy_from_user+0x1c/0xd0 [ 2535.898062][T26447] do_vfs_ioctl+0x1095/0x14c0 [ 2535.902736][T26447] __se_sys_ioctl+0x83/0x140 [ 2535.907335][T26447] __x64_sys_ioctl+0x3f/0x50 [ 2535.911955][T26447] do_syscall_64+0x44/0xa0 [ 2535.916435][T26447] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2535.922339][T26447] RIP: 0033:0x7f8e5ec75a39 [ 2535.926752][T26447] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2535.946442][T26447] RSP: 002b:00007f8e5c9cb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2535.954951][T26447] RAX: ffffffffffffffda RBX: 00007f8e5ed89020 RCX: 00007f8e5ec75a39 [ 2535.963024][T26447] RDX: 00000000200000c0 RSI: 0000000040305828 RDI: 0000000000000003 [ 2535.970997][T26447] RBP: 00007f8e5c9cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2535.979062][T26447] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 12:09:41 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000300ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f0000000c0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:41 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000400ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f0000000d0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2535.987036][T26447] R13: 00007ffda26795af R14: 00007f8e5c9cb300 R15: 0000000000022000 [ 2536.004011][T26436] loop2: detected capacity change from 0 to 264192 [ 2536.018375][T26436] EXT4-fs (loop2): Invalid log block size: 20 12:09:42 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x10000000009}) 12:09:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000002000000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:09:42 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x4, 0x101}) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus/file0\x00', 0x10c) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x401c5820, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) 12:09:42 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000500ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f0000000e0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2536.417495][T26461] loop2: detected capacity change from 0 to 264192 [ 2536.430665][T26461] EXT4-fs (loop2): Invalid log block size: 32 [ 2536.472845][T26461] loop2: detected capacity change from 0 to 264192 [ 2536.486080][T26461] EXT4-fs (loop2): Invalid log block size: 32 12:09:42 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) (fail_nth: 2) 12:09:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f0000000f0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:42 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000600ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000002200000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:09:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000100000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2536.672009][T26476] loop2: detected capacity change from 0 to 264192 12:09:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000004100000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:42 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000700ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2536.730375][T26476] EXT4-fs (loop2): Invalid log block size: 34 [ 2536.793438][T26476] loop2: detected capacity change from 0 to 264192 [ 2536.822987][T26476] EXT4-fs (loop2): Invalid log block size: 34 12:09:43 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x1d, 0x0, 0x10000000009}) 12:09:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000010100000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:43 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000800ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000002300000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:09:43 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000001940)={0x9, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f0000000040)) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r2, 0xc0305302, &(0x7f0000000040)) r3 = inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000140)={0x0, 0x0}) ptrace$setopts(0x4206, r4, 0x0, 0x0) rt_sigqueueinfo(r4, 0x33, &(0x7f0000000400)={0x0, 0x0, 0xfffffffffffffff9}) ptrace$getregset(0x4204, r4, 0x202, &(0x7f0000000100)={&(0x7f0000000000)=""/32, 0x20}) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0x18) setregid(0x0, r6) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000180)="fde3e759b80106a8a138de3d06d7af8f973f98bf8fdd6167a1ebaede65b803c264850b6918decdcf6deae57ee0f603ac97d6c8814c8c242a6adb165d33ce2cedd48194e37fd2459c9b7155ac979185d08fce59041bf2b27471844aae1fcf6e", 0x5f}, {&(0x7f0000000200)="b48372a52b8c914cd6ebb873b6c723f9a2afdfaac1443009df99569490e5356b5db742036b860b8f0133f25d35227067012a505915cb64e7a33c3beecb1b7642be110fe9cd41cbcfb0ae7c24c0b1314289e0308c8cc19c2f471c7c0c3e97b04c43a4524d184b12f9fe", 0x69}, {&(0x7f00000002c0)="7f3651509d493e3ab69563cb94dfeb88e1f1e457315f0f1d82bf4e3ca5d566235e39dac2d1b1dcd035922563edadda1dcc7f660c34cf6865e9d06c045d6a82a893c9bbea02a051ec6ad9d668c700d00d60a4129000626e9e299f40c433c440b45c226a8021d83aecfccce72bb6fea9e4", 0x70}, {&(0x7f0000000340)="4685d68a2bb16dc02c8ef8cbf044edb128632b2c66705a0bc051e9ad352062531abe96bb4a08a8c5127c0198ee35380fac166c11ee4bd77e80290eee89a750f2417643490ad93f930519c06c79", 0x4d}, {&(0x7f0000000000)="474eac68905974392bffc347d6f350cc208c4916e915abf60b3ad47c1bb78c9faec19feb6df71bef69", 0x29}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f0000000080)="c2aec032f6342b7d4f5ad92939f621f1c1326afe5a14a0b8f059c8834da6af4c57d5e880fc2f9648", 0x28}, {&(0x7f00000013c0)="445ea1387538f854d747f0cf4d3412b2bdcba889ab5bc7c1e359f2f0cf2bf7be90308a231fb32a450977abcf055d537cd2db6cca2876bd294144a255c401bcf535c1efe1d85b80fbfaf1a0e28e491a54db6abf6b77773a951943b4f68ecb699a253d841767df43133cb5e5a3c4ab9419e8af1f69f89e8744d4", 0x79}, {&(0x7f0000001440)="4f8e4fc88e07b7e6395d148309e151c720f9ca618254fb68a275e2995cf1f03d7680b64a294eca50e7f599dddbfcc2000ea17a5f774afabd93b1f08fa25117e0bdcdf3854bbe63e27938b951308d27afe0eb2eb8580340667ed72f749b417374d427bab7d288b714ceee57d5e11f19febe26f1c20666f773aab7e2ad974147980f67cbe26cc9bec255fe8eed891816c38b05804a20da87153bc1b799b848048a0396cee866494d2d4ffcc7a04713e2568bdec8c220b3aba702f4f3707bf470bd1a908b7a45e90bd3dfbfbf2f8e45ae63be8fbc5d11a8a8361a9952c800d4588058d6989267cce7f607605077b983c2", 0xef}, {&(0x7f0000001540)="2553c901495d321b8c7bd06a2281987cdb586f696d99bbe10f2d1c888467a7e126d930bda1f4cf4b7a728730eb7d2548cf11215d2d048dc26f15", 0x3a}], 0xa, 0x0, 0x0, 0x8000}}, {{&(0x7f0000001640)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000001900)=[{&(0x7f00000016c0)="0aabcfd204ed5760ee7f3cbf1da1042387f3e3a372e7a0de70d485d1bc9631fa951e14c5d9359706967feb8f91517d852b4d903af03b97c6a72df9eb6c2fa35ff77b2853efa8470da3f65535050d83116da5363502d68e65dea679d4f526487699ba752a20856677d1c00f96", 0x6c}, {&(0x7f0000001740)="a14ae8039b5875effebcf9977c3f5fa6e5b7f1fc16d59c68355ff2cb8f9428ad73580ec7eb99572ab5a8402bbddbf668060901bbb2e11d6e13ed2a0ff1a3a6b56b89565d10569252ce2133d0ab74910853f8b584542469105d6095", 0x5b}, {&(0x7f00000017c0)="28deebf8ad34db349610790a5072bedd496963d75c9b209e7a4f5046756328137ac7409caa7ce1c8a57cc7578959ce97a6618711fd1bcc9a8aac", 0x3a}, {&(0x7f0000001800)="22b5f446c99b86f35aef3cfd8cdfa4c3337fae6c3053eb16fa9b89ab45b5627ab5d699dd90fb5c17720f2d7bab7a9ff271dbcc08d134cf549b5a8ad83030a48229bcec7ad01dbf6fc52211835a379d45486c16c2db7797b96499187b0f48b60f34a183d512762ef1beb5909e5c96ec6d01820b37ca16591c70baaf266447d39e18b07afd8698a8be58f48a80544be3f6331328a48f7955c5d786adef55b8a23159428166fce85029db42c81cde25aca672147ca73c8453ef9fab3da68e196f6847b3020070d11619692ffb275d04cddb8a623854b869653d973fae1355d0a8989520", 0xe2}], 0x4, &(0x7f0000001980)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff, r1, r2]}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xee01, r6}}}], 0x58, 0x20000810}}], 0x2, 0x4000000) ioctl$FS_IOC_RESVSP(r0, 0x401c5820, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) write(r0, &(0x7f0000000100)="26879828bc4974c6ed25cc653b0f713222983c977f3171a86ef8c4cfbbd5056ba18787272cf5fa714dcb11eb1206f70d5a8fd9240787771bc499302f190863d1e0305bc39f4db62a796945791cc6aecc1dc39389fb5f34b6099ae9f4662fe2881ac9ce80de499f6e203112624b150b8b25c11126290ba817c4bf", 0x7a) [ 2537.227242][T26495] loop2: detected capacity change from 0 to 264192 [ 2537.264772][T26495] EXT4-fs (loop2): Invalid log block size: 35 [ 2537.312563][T26495] loop2: detected capacity change from 0 to 264192 [ 2537.329498][T26495] EXT4-fs (loop2): Invalid log block size: 35 [ 2537.389081][T26489] FAULT_INJECTION: forcing a failure. [ 2537.389081][T26489] name failslab, interval 1, probability 0, space 0, times 0 [ 2537.401996][T26489] CPU: 0 PID: 26489 Comm: syz-executor.3 Not tainted 5.15.0-rc7-syzkaller #0 [ 2537.410762][T26489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2537.420822][T26489] Call Trace: [ 2537.424104][T26489] dump_stack_lvl+0xd6/0x122 [ 2537.428749][T26489] dump_stack+0x11/0x1b [ 2537.432914][T26489] should_fail+0x23c/0x250 [ 2537.437371][T26489] ? jbd2__journal_start+0xf7/0x3b0 [ 2537.442604][T26489] __should_failslab+0x81/0x90 [ 2537.447372][T26489] should_failslab+0x5/0x20 [ 2537.451899][T26489] kmem_cache_alloc+0x4f/0x300 [ 2537.456674][T26489] jbd2__journal_start+0xf7/0x3b0 [ 2537.461703][T26489] __ext4_journal_start_sb+0x159/0x2d0 [ 2537.467184][T26489] ext4_alloc_file_blocks+0x258/0x730 [ 2537.472554][T26489] ext4_fallocate+0x2a7/0x4d0 [ 2537.477232][T26489] ? ext4_ext_truncate+0x170/0x170 [ 2537.482367][T26489] vfs_fallocate+0x459/0x6a0 [ 2537.487060][T26489] do_vfs_ioctl+0x13c6/0x14c0 [ 2537.491738][T26489] __se_sys_ioctl+0x83/0x140 [ 2537.496336][T26489] __x64_sys_ioctl+0x3f/0x50 [ 2537.500949][T26489] do_syscall_64+0x44/0xa0 [ 2537.505485][T26489] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2537.511384][T26489] RIP: 0033:0x7f8e5ec75a39 [ 2537.515878][T26489] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2537.535566][T26489] RSP: 002b:00007f8e5c9cb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2537.544111][T26489] RAX: ffffffffffffffda RBX: 00007f8e5ed89020 RCX: 00007f8e5ec75a39 [ 2537.552094][T26489] RDX: 00000000200000c0 RSI: 0000000040305828 RDI: 0000000000000003 [ 2537.560074][T26489] RBP: 00007f8e5c9cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2537.568045][T26489] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2537.576020][T26489] R13: 00007ffda26795af R14: 00007f8e5c9cb300 R15: 0000000000022000 12:09:43 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) (fail_nth: 3) 12:09:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000110000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:43 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020001800ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000002400000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:09:43 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x401c5820, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) 12:09:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000120000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:43 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020002600ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2537.861891][T26510] loop2: detected capacity change from 0 to 264192 [ 2537.872354][T26510] EXT4-fs (loop2): Invalid log block size: 36 [ 2537.944240][T26510] loop2: detected capacity change from 0 to 264192 [ 2537.955927][T26510] EXT4-fs (loop2): Invalid log block size: 36 12:09:43 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x1e, 0x0, 0x10000000009}) 12:09:43 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x401c5820, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) 12:09:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f0000001b0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:43 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020007e00ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000002500000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) [ 2538.103045][T26528] loop2: detected capacity change from 0 to 264192 [ 2538.126340][T26528] EXT4-fs (loop2): Invalid log block size: 37 [ 2538.182701][T26528] loop2: detected capacity change from 0 to 264192 [ 2538.201877][T26528] EXT4-fs (loop2): Invalid log block size: 37 [ 2538.424040][T26524] FAULT_INJECTION: forcing a failure. [ 2538.424040][T26524] name failslab, interval 1, probability 0, space 0, times 0 [ 2538.436733][T26524] CPU: 1 PID: 26524 Comm: syz-executor.3 Not tainted 5.15.0-rc7-syzkaller #0 [ 2538.445519][T26524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2538.455664][T26524] Call Trace: [ 2538.458955][T26524] dump_stack_lvl+0xd6/0x122 [ 2538.463593][T26524] dump_stack+0x11/0x1b [ 2538.467814][T26524] should_fail+0x23c/0x250 [ 2538.472331][T26524] ? kcalloc+0x32/0x50 [ 2538.476403][T26524] __should_failslab+0x81/0x90 [ 2538.481267][T26524] should_failslab+0x5/0x20 [ 2538.485771][T26524] __kmalloc+0x6f/0x350 [ 2538.489996][T26524] ? mod_objcg_state+0x3ff/0x650 [ 2538.494932][T26524] kcalloc+0x32/0x50 [ 2538.498883][T26524] ext4_find_extent+0x21c/0x7f0 [ 2538.503726][T26524] ext4_ext_map_blocks+0x115/0x1ff0 [ 2538.508988][T26524] ? ext4_es_lookup_extent+0x36b/0x490 [ 2538.514487][T26524] ext4_map_blocks+0x71e/0xf00 [ 2538.519260][T26524] ext4_alloc_file_blocks+0x281/0x730 [ 2538.524721][T26524] ext4_fallocate+0x2a7/0x4d0 [ 2538.529393][T26524] ? ext4_ext_truncate+0x170/0x170 [ 2538.534650][T26524] vfs_fallocate+0x459/0x6a0 [ 2538.539230][T26524] do_vfs_ioctl+0x13c6/0x14c0 [ 2538.544018][T26524] __se_sys_ioctl+0x83/0x140 [ 2538.548606][T26524] __x64_sys_ioctl+0x3f/0x50 [ 2538.553277][T26524] do_syscall_64+0x44/0xa0 [ 2538.557696][T26524] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2538.563587][T26524] RIP: 0033:0x7f8e5ec75a39 [ 2538.568108][T26524] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2538.587736][T26524] RSP: 002b:00007f8e5c9cb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2538.596156][T26524] RAX: ffffffffffffffda RBX: 00007f8e5ed89020 RCX: 00007f8e5ec75a39 [ 2538.604149][T26524] RDX: 00000000200000c0 RSI: 0000000040305828 RDI: 0000000000000003 [ 2538.612163][T26524] RBP: 00007f8e5c9cb1d0 R08: 0000000000000000 R09: 0000000000000000 12:09:44 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) (fail_nth: 4) 12:09:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f0000201c0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:44 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020008400ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2538.620168][T26524] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2538.628177][T26524] R13: 00007ffda26795af R14: 00007f8e5c9cb300 R15: 0000000000022000 12:09:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a92700000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:09:44 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f1400000000000000000400000000000200002000002000fe00ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2538.685603][T26539] loop2: detected capacity change from 0 to 264192 12:09:44 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7f, 0x8}) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x401c5820, &(0x7f00000000c0)={0x0, 0x0, 0x5, 0x3}) 12:09:44 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000402ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2538.741652][T26539] EXT4-fs (loop2): Invalid log block size: 39 [ 2538.793079][T26539] loop2: detected capacity change from 0 to 264192 [ 2538.804143][T26539] EXT4-fs (loop2): Invalid log block size: 39 12:09:44 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x21, 0x0, 0x10000000009}) 12:09:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f0000001f0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:44 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000003ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a92800000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:09:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000200000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2538.989388][T26561] loop2: detected capacity change from 0 to 264192 [ 2539.019355][T26561] EXT4-fs (loop2): Invalid log block size: 40 [ 2539.093856][T26561] loop2: detected capacity change from 0 to 264192 [ 2539.101658][T26561] EXT4-fs (loop2): Invalid log block size: 40 [ 2539.236818][T26556] FAULT_INJECTION: forcing a failure. [ 2539.236818][T26556] name failslab, interval 1, probability 0, space 0, times 0 [ 2539.249567][T26556] CPU: 1 PID: 26556 Comm: syz-executor.3 Not tainted 5.15.0-rc7-syzkaller #0 [ 2539.258354][T26556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2539.268466][T26556] Call Trace: [ 2539.271737][T26556] dump_stack_lvl+0xd6/0x122 [ 2539.276396][T26556] dump_stack+0x11/0x1b [ 2539.280539][T26556] should_fail+0x23c/0x250 [ 2539.284950][T26556] ? ext4_mb_new_blocks+0x317/0x1fc0 [ 2539.290226][T26556] __should_failslab+0x81/0x90 [ 2539.295042][T26556] should_failslab+0x5/0x20 [ 2539.299636][T26556] kmem_cache_alloc+0x4f/0x300 [ 2539.304469][T26556] ext4_mb_new_blocks+0x317/0x1fc0 [ 2539.309641][T26556] ? ext4_find_extent+0x6cf/0x7f0 [ 2539.314660][T26556] ? ext4_ext_search_right+0x300/0x540 [ 2539.320165][T26556] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 2539.325884][T26556] ext4_ext_map_blocks+0x15ed/0x1ff0 [ 2539.331228][T26556] ? ext4_es_lookup_extent+0x36b/0x490 [ 2539.336677][T26556] ext4_map_blocks+0x71e/0xf00 [ 2539.341579][T26556] ext4_alloc_file_blocks+0x281/0x730 [ 2539.346998][T26556] ext4_fallocate+0x2a7/0x4d0 [ 2539.351672][T26556] ? ext4_ext_truncate+0x170/0x170 [ 2539.356777][T26556] vfs_fallocate+0x459/0x6a0 [ 2539.361374][T26556] do_vfs_ioctl+0x13c6/0x14c0 [ 2539.366061][T26556] __se_sys_ioctl+0x83/0x140 [ 2539.370647][T26556] __x64_sys_ioctl+0x3f/0x50 [ 2539.375283][T26556] do_syscall_64+0x44/0xa0 [ 2539.379700][T26556] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2539.385598][T26556] RIP: 0033:0x7f8e5ec75a39 [ 2539.390010][T26556] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2539.409728][T26556] RSP: 002b:00007f8e5c9cb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2539.418165][T26556] RAX: ffffffffffffffda RBX: 00007f8e5ed89020 RCX: 00007f8e5ec75a39 [ 2539.426144][T26556] RDX: 00000000200000c0 RSI: 0000000040305828 RDI: 0000000000000003 [ 2539.434148][T26556] RBP: 00007f8e5c9cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2539.442131][T26556] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2539.450105][T26556] R13: 00007ffda26795af R14: 00007f8e5c9cb300 R15: 0000000000022000 12:09:45 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) (fail_nth: 5) 12:09:45 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000204ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000010200000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a92900000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:09:45 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x22, 0x0, 0x10000000009}) [ 2539.508974][T26575] loop2: detected capacity change from 0 to 264192 [ 2539.535356][T26575] EXT4-fs (loop2): Invalid log block size: 41 [ 2539.593692][T26575] loop2: detected capacity change from 0 to 264192 [ 2539.604168][T26575] EXT4-fs (loop2): Invalid log block size: 41 12:09:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) (fail_nth: 1) 12:09:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000020200000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:45 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000604ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a92a00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) [ 2539.744434][T26589] loop2: detected capacity change from 0 to 264192 [ 2539.774569][T26593] FAULT_INJECTION: forcing a failure. [ 2539.774569][T26593] name fail_page_alloc, interval 1, probability 0, space 0, times 0 12:09:45 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000005ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000220000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2539.787880][T26593] CPU: 0 PID: 26593 Comm: syz-executor.0 Not tainted 5.15.0-rc7-syzkaller #0 [ 2539.796641][T26593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2539.806777][T26593] Call Trace: [ 2539.810107][T26593] dump_stack_lvl+0xd6/0x122 [ 2539.814702][T26593] dump_stack+0x11/0x1b [ 2539.818869][T26593] should_fail+0x23c/0x250 [ 2539.818893][T26593] __alloc_pages+0x102/0x320 [ 2539.818978][T26593] alloc_pages_vma+0x5ee/0x770 [ 2539.819002][T26593] ? __alloc_pages+0x194/0x320 12:09:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a92b00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) [ 2539.819082][T26593] wp_page_copy+0x12c/0x10a0 [ 2539.819100][T26593] ? _kstrtoull+0x301/0x320 [ 2539.819120][T26593] do_wp_page+0x5a8/0xba0 [ 2539.819136][T26593] handle_mm_fault+0x96e/0x1580 [ 2539.819165][T26593] do_user_addr_fault+0x609/0xbe0 [ 2539.819186][T26593] exc_page_fault+0x91/0x220 [ 2539.819206][T26593] ? asm_exc_page_fault+0x8/0x30 [ 2539.819233][T26593] asm_exc_page_fault+0x1e/0x30 [ 2539.819317][T26593] RIP: 0033:0x7f0de0727bec [ 2539.819330][T26593] Code: e1 48 29 c1 4c 8b 0e 4c 89 c8 49 f7 e3 48 c1 ea 1b 48 89 d0 48 c1 e0 07 48 01 d0 4c 89 ca 48 c1 e0 14 48 29 c2 48 39 ca 77 3c <48> 89 16 48 89 d1 48 01 c9 48 39 cf 48 0f 42 f9 49 83 c0 01 48 83 [ 2539.819346][T26593] RSP: 002b:00007f0dde4fef50 EFLAGS: 00010287 [ 2539.819359][T26593] RAX: 0000000000000000 RBX: 0000000020000200 RCX: 0000000008100000 [ 2539.819371][T26593] RDX: 0000000000000000 RSI: 0000000020001008 RDI: 00000000051eeae2 [ 2539.819381][T26593] RBP: 000000000000fffe R08: 0000000000000095 R09: 0000000000000000 [ 2539.819440][T26593] R10: 0000000000001000 R11: fe03f80fe03f80ff R12: 0000000008100000 [ 2539.819453][T26593] R13: 0000000020000100 R14: 00007f0dde4ff000 R15: 0000000020000540 [ 2539.819536][T26593] syz-executor.0 invoked oom-killer: gfp_mask=0x0(), order=0, oom_score_adj=1000 [ 2539.819555][T26593] CPU: 0 PID: 26593 Comm: syz-executor.0 Not tainted 5.15.0-rc7-syzkaller #0 [ 2539.819620][T26593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2539.819629][T26593] Call Trace: [ 2539.819634][T26593] dump_stack_lvl+0xd6/0x122 [ 2539.819654][T26593] dump_stack+0x11/0x1b [ 2539.819682][T26593] dump_header+0x98/0x400 [ 2539.819698][T26593] oom_kill_process+0xf5/0x250 [ 2539.819714][T26593] out_of_memory+0x5ed/0x6e0 [ 2539.819731][T26593] pagefault_out_of_memory+0x64/0xa0 [ 2539.819751][T26593] exc_page_fault+0x91/0x220 [ 2539.819827][T26593] ? asm_exc_page_fault+0x8/0x30 [ 2539.819851][T26593] asm_exc_page_fault+0x1e/0x30 [ 2539.819875][T26593] RIP: 0033:0x7f0de0727bec [ 2539.819887][T26593] Code: e1 48 29 c1 4c 8b 0e 4c 89 c8 49 f7 e3 48 c1 ea 1b 48 89 d0 48 c1 e0 07 48 01 d0 4c 89 ca 48 c1 e0 14 48 29 c2 48 39 ca 77 3c <48> 89 16 48 89 d1 48 01 c9 48 39 cf 48 0f 42 f9 49 83 c0 01 48 83 [ 2539.819923][T26593] RSP: 002b:00007f0dde4fef50 EFLAGS: 00010287 [ 2539.819936][T26593] RAX: 0000000000000000 RBX: 0000000020000200 RCX: 0000000008100000 [ 2539.819946][T26593] RDX: 0000000000000000 RSI: 0000000020001008 RDI: 00000000051eeae2 [ 2539.819958][T26593] RBP: 000000000000fffe R08: 0000000000000095 R09: 0000000000000000 [ 2539.819971][T26593] R10: 0000000000001000 R11: fe03f80fe03f80ff R12: 0000000008100000 [ 2539.820020][T26593] R13: 0000000020000100 R14: 00007f0dde4ff000 R15: 0000000020000540 [ 2539.820034][T26593] Mem-Info: [ 2539.820038][T26593] active_anon:500282 inactive_anon:74535 isolated_anon:0 [ 2539.820038][T26593] active_file:29853 inactive_file:87529 isolated_file:0 [ 2539.820038][T26593] unevictable:0 dirty:3501 writeback:0 [ 2539.820038][T26593] slab_reclaimable:6235 slab_unreclaimable:9529 [ 2539.820038][T26593] mapped:58520 shmem:500336 pagetables:6156 bounce:0 [ 2539.820038][T26593] kernel_misc_reclaimable:0 [ 2539.820038][T26593] free:1237578 free_pcp:1220 free_cma:0 [ 2539.820105][T26593] Node 0 active_anon:2001128kB inactive_anon:298140kB active_file:119412kB inactive_file:350116kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:234080kB dirty:14004kB writeback:0kB shmem:2001344kB writeback_tmp:0kB kernel_stack:4656kB pagetables:24624kB all_unreclaimable? no [ 2539.820149][T26593] Node 0 DMA free:15360kB min:20kB low:32kB high:44kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2539.820199][T26593] lowmem_reserve[]: 0 2942 7920 7920 [ 2539.820254][T26593] Node 0 DMA32 free:3014332kB min:4224kB low:7236kB high:10248kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:3017192kB mlocked:0kB bounce:0kB free_pcp:2860kB local_pcp:56kB free_cma:0kB [ 2539.820319][T26593] lowmem_reserve[]: 0 0 4978 4978 [ 2539.820341][T26593] Node 0 Normal free:1920620kB min:7152kB low:12248kB high:17344kB reserved_highatomic:0KB active_anon:2001128kB inactive_anon:298140kB active_file:119412kB inactive_file:350116kB unevictable:0kB writepending:14024kB present:5242880kB managed:5098288kB mlocked:0kB bounce:0kB free_pcp:2000kB local_pcp:288kB free_cma:0kB [ 2539.820519][T26593] lowmem_reserve[]: 0 0 0 0 [ 2539.820541][T26593] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 2539.820705][T26593] Node 0 DMA32: 3*4kB (M) 2*8kB (M) 4*16kB (M) 5*32kB (M) 5*64kB (M) 3*128kB (M) 3*256kB (M) 4*512kB (M) 2*1024kB (M) 1*2048kB (M) 734*4096kB (M) = 3014332kB [ 2539.820903][T26593] Node 0 Normal: 779*4kB (ME) 804*8kB (UME) 468*16kB (UME) 251*32kB (UME) 112*64kB (UME) 39*128kB (UME) 97*256kB (UME) 62*512kB (UM) 50*1024kB (UM) 5*2048kB (UE) 431*4096kB (UM) = 1920620kB [ 2539.821190][T26593] Node 0 hugepages_total=4 hugepages_free=1 hugepages_surp=0 hugepages_size=2048kB [ 2539.821206][T26593] 541511 total pagecache pages [ 2539.821212][T26593] 0 pages in swap cache [ 2539.821218][T26593] Swap cache stats: add 0, delete 0, find 0/0 [ 2539.821229][T26593] Free swap = 0kB [ 2539.821234][T26593] Total swap = 0kB [ 2539.821239][T26593] 2097051 pages RAM [ 2539.821244][T26593] 0 pages HighMem/MovableOnly [ 2539.821325][T26593] 64341 pages reserved [ 2539.821331][T26593] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0,global_oom,task_memcg=/,task=syz-executor.0,pid=26593,uid=0 [ 2539.821381][T26593] Out of memory (oom_kill_allocating_task): Killed process 26592 (syz-executor.0) total-vm:85216kB, anon-rss:376kB, file-rss:34880kB, shmem-rss:0kB, UID:0 pgtables:136kB oom_score_adj:1000 [ 2539.822131][T26589] EXT4-fs (loop2): Invalid log block size: 42 [ 2539.823090][ T24] oom_reaper: reaped process 26592 (syz-executor.0), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB [ 2539.832867][T26589] loop2: detected capacity change from 0 to 264192 [ 2539.833302][T26589] EXT4-fs (loop2): Invalid log block size: 42 [ 2539.932184][T26601] loop2: detected capacity change from 0 to 264192 [ 2540.151561][T26585] FAULT_INJECTION: forcing a failure. [ 2540.151561][T26585] name failslab, interval 1, probability 0, space 0, times 0 [ 2540.511607][T26601] EXT4-fs (loop2): Invalid log block size: 43 [ 2540.521227][T26585] CPU: 0 PID: 26585 Comm: syz-executor.3 Not tainted 5.15.0-rc7-syzkaller #0 [ 2540.536138][T26585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2540.536149][T26585] Call Trace: [ 2540.536157][T26585] dump_stack_lvl+0xd6/0x122 [ 2540.554128][T26585] dump_stack+0x11/0x1b [ 2540.558342][T26585] should_fail+0x23c/0x250 [ 2540.562757][T26585] ? ext4_mb_new_blocks+0x73f/0x1fc0 [ 2540.568068][T26585] __should_failslab+0x81/0x90 [ 2540.572881][T26585] should_failslab+0x5/0x20 [ 2540.577406][T26585] kmem_cache_alloc+0x4f/0x300 [ 2540.582190][T26585] ext4_mb_new_blocks+0x73f/0x1fc0 [ 2540.587337][T26585] ? ext4_find_extent+0x6cf/0x7f0 [ 2540.592397][T26585] ? ext4_ext_search_right+0x300/0x540 [ 2540.597938][T26585] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 2540.603698][T26585] ext4_ext_map_blocks+0x15ed/0x1ff0 [ 2540.608986][T26585] ? ext4_es_lookup_extent+0x36b/0x490 [ 2540.614443][T26585] ext4_map_blocks+0x71e/0xf00 [ 2540.619209][T26585] ext4_alloc_file_blocks+0x281/0x730 [ 2540.624580][T26585] ext4_fallocate+0x2a7/0x4d0 [ 2540.629266][T26585] ? ext4_ext_truncate+0x170/0x170 [ 2540.634387][T26585] vfs_fallocate+0x459/0x6a0 [ 2540.638973][T26585] do_vfs_ioctl+0x13c6/0x14c0 [ 2540.643701][T26585] __se_sys_ioctl+0x83/0x140 [ 2540.648288][T26585] __x64_sys_ioctl+0x3f/0x50 [ 2540.652906][T26585] do_syscall_64+0x44/0xa0 [ 2540.657324][T26585] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2540.663220][T26585] RIP: 0033:0x7f8e5ec75a39 [ 2540.667633][T26585] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2540.687235][T26585] RSP: 002b:00007f8e5c9cb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2540.695649][T26585] RAX: ffffffffffffffda RBX: 00007f8e5ed89020 RCX: 00007f8e5ec75a39 [ 2540.703620][T26585] RDX: 00000000200000c0 RSI: 0000000040305828 RDI: 0000000000000003 [ 2540.711679][T26585] RBP: 00007f8e5c9cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2540.719652][T26585] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2540.727623][T26585] R13: 00007ffda26795af R14: 00007f8e5c9cb300 R15: 0000000000022000 12:09:46 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) 12:09:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000230000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:46 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000006ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:46 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x23, 0x0, 0x10000000009}) [ 2540.849051][T26604] loop2: detected capacity change from 0 to 264192 [ 2540.863109][T26604] EXT4-fs (loop2): Invalid log block size: 43 12:09:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a92c00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:09:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000240000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:46 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000406ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000250000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2540.957346][T26619] loop2: detected capacity change from 0 to 264192 12:09:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000002280000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:46 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000007ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2541.001740][T26619] EXT4-fs (loop2): Invalid log block size: 44 12:09:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000002290000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2541.072883][T26619] loop2: detected capacity change from 0 to 264192 [ 2541.098599][T26619] EXT4-fs (loop2): Invalid log block size: 44 12:09:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a92d00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:09:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f0000002d0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:47 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x24, 0x0, 0x10000000009}) 12:09:47 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000018ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:47 executing program 3: ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000000)={0x7, 0xfffffff8, 0x8001, 0x6, 0x18, "71aeaf97fffb5d435a350e282bbb5e4a65c74b"}) r0 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'vlan1\x00', @ifru_map}) pidfd_getfd(r0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r0, 0x8918, &(0x7f00000001c0)={0x0, @isdn={0x22, 0x6, 0x8, 0x9, 0x9}, @in={0x2, 0x0, @broadcast}, @xdp={0x2c, 0x0, 0x0, 0xfffffffd}}) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f0000000040)) read(r1, &(0x7f0000000180)=""/7, 0x7) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000100)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) setrlimit(0xe, &(0x7f0000000080)={0x6, 0x8}) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x130) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) sched_setattr(0x0, 0x0, 0x0) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) [ 2541.740151][T26635] loop2: detected capacity change from 0 to 264192 [ 2541.795013][T26635] EXT4-fs (loop2): Invalid log block size: 45 12:09:47 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000026ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f0000002e0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2541.842922][T26635] loop2: detected capacity change from 0 to 264192 [ 2541.869919][T26635] EXT4-fs (loop2): Invalid log block size: 45 12:09:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000002300000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:47 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f1400000000000000000400000000000200002000002000003fddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000002e00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:09:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000002310000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:47 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000040ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2541.998168][T26661] loop2: detected capacity change from 0 to 264192 12:09:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000320000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2542.040476][T26661] EXT4-fs (loop2): Invalid log block size: 46 [ 2542.113518][T26661] loop2: detected capacity change from 0 to 264192 [ 2542.120584][T26661] EXT4-fs (loop2): Invalid log block size: 46 12:09:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x3, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000001330000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a92e00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) [ 2542.736688][T26669] loop2: detected capacity change from 0 to 264192 [ 2542.743976][T26669] EXT4-fs (loop2): Invalid log block size: 46 12:09:48 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)={0x0, 0x0}) sched_setattr(r1, &(0x7f0000000000)={0x38, 0x3, 0x10000000, 0x40, 0xffffffff, 0x10001, 0x1, 0xd5, 0x2, 0xfffff9fd}, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) 12:09:48 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x25, 0x0, 0x10000000009}) 12:09:48 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f1400000000000000000400000000000200002000002000007eddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000001340000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2542.842152][T26669] loop2: detected capacity change from 0 to 264192 [ 2542.862158][T26669] EXT4-fs (loop2): Invalid log block size: 46 12:09:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a92f00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:09:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000003380000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:48 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000084ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2542.978183][T26683] loop2: detected capacity change from 0 to 264192 [ 2543.014707][T26683] EXT4-fs (loop2): Invalid log block size: 47 12:09:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f0000003f0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:48 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f1400000000000000000400000000000200002000002000fffeddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x4, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000400000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:55 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f1400000000000000000400000000000200002000002000feffddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:55 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x26, 0x0, 0x10000000009}) 12:09:55 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) setrlimit(0x7, &(0x7f0000000000)={0x4, 0x1}) setrlimit(0x2, &(0x7f0000000080)={0xffffffffffff0001, 0x50000}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) 12:09:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a93000000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:09:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000800400000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:55 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000002ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2549.249716][T27158] loop2: detected capacity change from 0 to 264192 [ 2549.267576][T27158] EXT4-fs (loop2): Invalid log block size: 48 12:09:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000001410000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:55 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000003ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2549.332775][T27158] loop2: detected capacity change from 0 to 264192 [ 2549.348184][T27158] EXT4-fs (loop2): Invalid log block size: 48 12:09:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000002410000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:55 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000004ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2549.848753][T27790] EXT4-fs (sda1): Delayed block allocation failed for inode 1206 at logical offset 15 with max blocks 2048 with error 28 [ 2549.861413][T27790] EXT4-fs (sda1): This should not happen!! Data will be lost [ 2549.861413][T27790] [ 2549.871003][T27790] EXT4-fs (sda1): Total free blocks count 0 [ 2549.876920][T27790] EXT4-fs (sda1): Free/Dirty block details [ 2549.882790][T27790] EXT4-fs (sda1): free_blocks=24744 [ 2549.887971][T27790] EXT4-fs (sda1): dirty_blocks=19827 [ 2549.893279][T27790] EXT4-fs (sda1): Block reservation details [ 2549.899173][T27790] EXT4-fs (sda1): i_reserved_data_blocks=2777 [ 2550.128004][ T4383] EXT4-fs (sda1): Inode 1206 (ffff88813f9469e0): i_reserved_data_blocks (2049) not cleared! 12:09:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x5, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000003100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:09:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000480000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:56 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000005ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:56 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x15e) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) 12:09:56 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x27, 0x0, 0x10000000009}) 12:09:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f0000004c0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:56 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000006ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2550.223486][T27192] loop2: detected capacity change from 0 to 264192 [ 2550.263361][T27192] EXT4-fs (loop2): Invalid log block size: 49 12:09:56 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000007ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000001520000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2550.344081][T27192] loop2: detected capacity change from 0 to 264192 [ 2550.361313][T27192] EXT4-fs (loop2): Invalid log block size: 49 12:09:56 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000008ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000600000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x6, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000680000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a93100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:09:56 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000018ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:56 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x5, 0x10000006, 0x8, 0x6, 0x8, 0x7, 0x0, 0xb900, 0x7}, 0x0) stat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$nfs4(&(0x7f0000000100), &(0x7f0000000140)='./bus\x00', 0x3, 0x2, &(0x7f00000003c0)=[{&(0x7f0000000180)="ed57464d806bb9bebe341f3c013ee972959560c74c1fd48ceca440019bf824e0a82093a5fdd3ab9e3c5b47624095340176cf3e6ea40fb663e9cbf5b294e53fa50548849afe58c0f6d177faa2b76092ee3175ec68957dbde5b7cfe429e309b2b8cc5767f7602b1ce94097c22cc94ec30e93c419486fd490809eace7b0828da5816cb95b5deb2d97cd4b03bec66a0e44bead4c1f62f9cdf77af74d25bce8d0b71f873cdf8add1c4621715773d4a93d20b8bc37716170ec4f7f768ce1f22b18a3c21bf66e23da66267f1c8d5e731b27fd4c12cebab4eaee93a65ce91a0030cbd2f643ae71fe74c0", 0xe6, 0xa1}, {&(0x7f00000002c0)="8ba4a6e88c3d17007f4969e9e8eb00b32860d48e55d28316f43f3271c0a87b88a55cc76452eda0ab37db4ce910229e027b156525c740684a81355b0e88203b4ae4d6d2e1c4ecd9a2ec9d0ec90cfed4597e2738ddbe061e99963fac94b59ebcda04144264733647e9471158dbd8d122622705032a7daf6f00d3b79fee799500ff1382c433450f5750408544bd725fd5f362e771763b6fa51e50096738f002b756e965d02e6b240e3cf619eb90316693c16125b415cc369ac3dae35dcc2b0aa73429f7906064fa9cef2b1110d604e6df3e", 0xd0, 0x6}], 0x402082, &(0x7f0000000540)={[{'\x00'}, {'-\x18'}, {}, {'\x00'}, {'\x01'}, {}, {'\x00\x90\xe4\xde\xef\x05\xa8|0\x95\xdd\x16\xba\x94\xf7\xbdf\xcbw\x9d\x84\xfb\xedx\xf8\xa0\x89q\xb9\xe1\xa74\x16i0\x19\xba\xf5\x8c\x9b\xcd\xa6\xfe\a\x93\xd6i2&\xdf\x1aK&\t\a\x1b\xfe\x1a\xcc\xd6B\\\\2\xe9j,\xc4\xe5\x04\rm\x13\x8dG\x92\xf9\x81\xf3\xd7\x12\x1c\xaaJ\xf4\x80{\xa9\xc7\x86\b\x00\x00\x00\x00\x00\x00\x00\xc1\x90\x16\x86/\xc3\xd3=\x9fR\xaa\xee\xd1w\x1c\x1a\xe1\x1dZI\bz\x15\xdaV\n\xbc\xa7\x92\x9be\xd9\xa4\xd2al\xaf\xa5\x80\x9e\xae%\x8f\xb4\xac(K\xb8\x1d9\xb2kd\xe1i\x8dPu7Q\x9f\x83;\xbd\xc5\xadMe\xca\xa0JP\xef\x7f\xc3\xdf\x93!i\xd2:3\xd1M\xc0\xe5\xc9\x0e\xe0\x13b\xa5\xaeJ\xaf\x18\xf9\x18\x9b\xe2\xd5\xee\x96\\p\xffI\x95&\xd6\xc7\xe9Y\xb5\xf0\xcb*ab|\x180V\x8c\xe5\xba\xee\xd5U\xac\x7f#,N\a\x01\x04q\x98fNq\x13\xb4\xc7\x00\x8b\xf8\xd3\x9f<\xa0\x96\x89kB\t-\xc9%\a\xce\x8f\xe8\x88\xd9\x91\x00x\x92\b\xff\x8f\xc0\xad~\x85\x8a\'\xe1\xf4e'}, {'\x00'}], [{@dont_measure}, {@fowner_gt={'fowner>', r1}}]}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) unlink(&(0x7f0000000000)='./bus\x00') 12:09:56 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x28, 0x0, 0x10000000009}) 12:09:56 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000026ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f0000006c0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2551.079547][T27218] loop2: detected capacity change from 0 to 264192 [ 2551.108906][T27218] EXT4-fs (loop2): Invalid log block size: 49 12:09:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000740000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:57 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f1400000000000000000400000000000200002000002000007eddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2551.172724][T27218] loop2: detected capacity change from 0 to 264192 [ 2551.179725][T27218] EXT4-fs (loop2): Invalid log block size: 49 12:09:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a93200000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:09:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f0000007a0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2551.282012][T27247] loop2: detected capacity change from 0 to 264192 [ 2551.301567][T27247] EXT4-fs (loop2): Invalid log block size: 50 [ 2551.383541][T27247] loop2: detected capacity change from 0 to 264192 [ 2551.400446][T27247] EXT4-fs (loop2): Invalid log block size: 50 12:09:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x8, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:57 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000084ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f0000017a0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000003300000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) [ 2551.955783][T27254] loop2: detected capacity change from 0 to 264192 [ 2552.007871][T27254] loop2: detected capacity change from 0 to 264192 12:09:58 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) getrlimit(0x6, &(0x7f0000000080)) 12:09:58 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x29, 0x0, 0x10000000009}) 12:09:58 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f140000000000000000040000000000020000200000200000feddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f0000017c0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a93300000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) [ 2552.375446][T27261] loop2: detected capacity change from 0 to 264192 [ 2552.388771][T27261] EXT4-fs (loop2): Invalid log block size: 51 12:09:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000002830000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:58 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4795fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2552.432725][T27261] loop2: detected capacity change from 0 to 264192 [ 2552.439917][T27261] EXT4-fs (loop2): Invalid log block size: 51 12:09:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000fffffff850000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x26, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a93400000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:09:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000fffffff8c0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:58 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4795f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2552.724624][T27284] loop2: detected capacity change from 0 to 264192 [ 2552.738767][T27284] EXT4-fs (loop2): Invalid log block size: 52 [ 2552.782797][T27284] loop2: detected capacity change from 0 to 264192 [ 2552.796889][T27284] EXT4-fs (loop2): Invalid log block size: 52 12:09:59 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x80) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) 12:09:59 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0200ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000003950000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a93500000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:09:59 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x2a, 0x0, 0x10000000009}) 12:09:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x7e, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2553.376939][T27292] loop2: detected capacity change from 0 to 264192 [ 2553.399577][T27292] EXT4-fs (loop2): Invalid log block size: 53 12:09:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f0000029a0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:59 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0300ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2553.442875][T27292] loop2: detected capacity change from 0 to 264192 [ 2553.450845][T27292] EXT4-fs (loop2): Invalid log block size: 53 12:09:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000001a00000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a93600000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:09:59 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0500ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000002ad0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2553.596855][T27315] loop2: detected capacity change from 0 to 264192 [ 2553.636560][T27315] EXT4-fs (loop2): Invalid log block size: 54 [ 2553.693779][T27315] loop2: detected capacity change from 0 to 264192 [ 2553.705554][T27315] EXT4-fs (loop2): Invalid log block size: 54 12:09:59 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0600ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:09:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000001be0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:09:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a93700000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:09:59 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xffffffff, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000100)={{0x0, 0x101, 0xbd9, 0x0, 0x7, 0x80000001, 0xb5, 0x20, 0x3, 0x1000, 0xfd22, 0x6, 0x1f, 0x9, 0x7fffffff}, 0x20, [0x0, 0x0, 0x0, 0x0]}) getrlimit(0x9, &(0x7f0000000240)) prlimit64(0x0, 0x0, &(0x7f0000000000)={0x0, 0x400000}, &(0x7f0000000080)) openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x100, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) rt_sigqueueinfo(r2, 0x33, &(0x7f0000000400)={0x0, 0x0, 0xfffffffffffffff9}) ptrace$getregset(0x4204, r2, 0x202, &(0x7f0000000100)={&(0x7f0000000000)=""/32, 0x20}) sched_setattr(r2, &(0x7f0000000200)={0x38, 0x2, 0x2e, 0xff, 0x401, 0x0, 0x6, 0x4, 0x2, 0x6}, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) [ 2554.078501][T27323] loop2: detected capacity change from 0 to 264192 [ 2554.100359][T27323] EXT4-fs (loop2): Invalid log block size: 55 [ 2554.142559][T27323] loop2: detected capacity change from 0 to 264192 [ 2554.162009][T27323] EXT4-fs (loop2): Invalid log block size: 55 12:10:00 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x2b, 0x0, 0x10000000009}) 12:10:00 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0e00ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000002be0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a93800000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x84, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f0000edc00000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2554.590369][T27336] loop2: detected capacity change from 0 to 264192 [ 2554.612657][T27336] EXT4-fs (loop2): Invalid log block size: 56 12:10:00 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0f00ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000002cc0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2554.664255][T27336] loop2: detected capacity change from 0 to 264192 [ 2554.681502][T27336] EXT4-fs (loop2): Invalid log block size: 56 12:10:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a93900000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:00 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655ffe00ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000001ce0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2554.783336][T27351] loop2: detected capacity change from 0 to 264192 [ 2554.827136][T27351] EXT4-fs (loop2): Invalid log block size: 57 12:10:00 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) 12:10:00 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x2c, 0x0, 0x10000000009}) 12:10:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000001cf0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:00 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0006ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2554.886089][T27351] loop2: detected capacity change from 0 to 264192 [ 2554.921837][T27351] EXT4-fs (loop2): Invalid log block size: 57 12:10:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a93a00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) [ 2555.024181][T27368] loop2: detected capacity change from 0 to 264192 [ 2555.042976][T27368] EXT4-fs (loop2): Invalid log block size: 58 [ 2555.092821][T27368] loop2: detected capacity change from 0 to 264192 [ 2555.106808][T27368] EXT4-fs (loop2): Invalid log block size: 58 12:10:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x204, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:01 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0007ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:01 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x2d, 0x0, 0x10000000009}) 12:10:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a93b00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000001d60000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000001d70000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2555.654379][T27375] loop2: detected capacity change from 0 to 264192 12:10:01 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x2e, 0x0, 0x10000000009}) 12:10:01 executing program 3: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0x6e, &(0x7f0000000600)=[{&(0x7f0000000180)=""/121, 0x79}, {&(0x7f00000002c0)=""/167, 0xa7}], 0x2, &(0x7f0000000380)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x128}, 0x40000000) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f00000004c0)=0x7656a2e8) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000500)={r4, 0x8, 0x9, 0x5}) ioctl$SG_SET_KEEP_ORPHAN(r5, 0x2287, &(0x7f0000000540)=0x14) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) getrlimit(0x7, &(0x7f0000000080)) sched_setattr(0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x109002, 0x82) write$P9_RREADLINK(r6, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2, {0x9}}, './bus\x00'}) ioctl$SG_GET_ACCESS_COUNT(r7, 0x2289, &(0x7f00000005c0)) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) setrlimit(0x6, &(0x7f0000000200)={0x4, 0x7fffffff}) 12:10:01 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655ffeffffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2555.715149][T27375] loop2: detected capacity change from 0 to 264192 12:10:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a93c00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000fffffffda0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:01 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0102ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2555.796323][T27393] loop2: detected capacity change from 0 to 264192 [ 2555.832014][T27393] EXT4-fs (loop2): Invalid log block size: 60 [ 2555.882520][T27393] loop2: detected capacity change from 0 to 264192 [ 2555.899267][T27393] EXT4-fs (loop2): Invalid log block size: 60 12:10:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x300, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:02 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0103ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a93d00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:02 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x2f, 0x0, 0x10000000009}) 12:10:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000fffffffe20000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:02 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r0, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) write$selinux_attr(r0, &(0x7f0000000140)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) setrlimit(0x1, &(0x7f0000000080)={0x3}) sched_setattr(0x0, 0x0, 0x0) r2 = getpgrp(0x0) sched_setattr(r2, &(0x7f0000000100)={0x38, 0x1, 0x80, 0x6, 0x9, 0x9, 0x7, 0xfffffffffffff801, 0x1, 0x7}, 0x0) fcntl$setstatus(r1, 0x4, 0x400) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) setrlimit(0xa, &(0x7f0000000000)={0xffffffff}) setrlimit(0x4, &(0x7f0000000180)={0x4, 0x8}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) 12:10:02 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0104ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2556.631919][T27406] loop2: detected capacity change from 0 to 264192 [ 2556.647572][T27406] EXT4-fs (loop2): Invalid log block size: 61 12:10:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000003f20000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:02 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0105ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000ffffffff40000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2556.702523][T27406] loop2: detected capacity change from 0 to 264192 [ 2556.711907][T27406] EXT4-fs (loop2): Invalid log block size: 61 12:10:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a93e00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:02 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0106ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000ffffffff60000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2556.812903][T27433] loop2: detected capacity change from 0 to 264192 [ 2556.850153][T27433] EXT4-fs (loop2): Invalid log block size: 62 [ 2556.882754][T27433] loop2: detected capacity change from 0 to 264192 [ 2556.903474][T27433] EXT4-fs (loop2): Invalid log block size: 62 12:10:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x402, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:03 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0107ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000ffffffdf90000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000003f00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:03 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x30, 0x0, 0x10000000009}) 12:10:03 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x36) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) [ 2557.519775][T27447] loop2: detected capacity change from 0 to 264192 12:10:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000ffffffffb0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:03 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0108ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2557.586297][T27447] EXT4-fs (loop2): Invalid log block size: 63 12:10:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000003fc0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:03 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0118ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000ffffffdfd0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2557.673585][T27447] loop2: detected capacity change from 0 to 264192 [ 2557.692333][T27447] EXT4-fs (loop2): Invalid log block size: 63 12:10:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a93f00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) [ 2557.791513][T27469] loop2: detected capacity change from 0 to 264192 [ 2557.821544][T27469] EXT4-fs (loop2): Invalid log block size: 63 [ 2557.862771][T27469] loop2: detected capacity change from 0 to 264192 [ 2557.881559][T27469] EXT4-fs (loop2): Invalid log block size: 63 12:10:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x406, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:04 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0126ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000004000000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:04 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x31, 0x0, 0x10000000009}) 12:10:04 executing program 3: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) 12:10:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000ffffffffe0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f00000fff0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2558.396477][T27473] loop2: detected capacity change from 0 to 264192 [ 2558.421420][T27473] EXT4-fs (loop2): Invalid log block size: 64 12:10:04 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f017effff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:04 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0184ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000ffffff7ff0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2558.472674][T27473] loop2: detected capacity change from 0 to 264192 [ 2558.490074][T27473] EXT4-fs (loop2): Invalid log block size: 64 12:10:04 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f01feffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a94000000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) [ 2558.614289][T27499] loop2: detected capacity change from 0 to 264192 [ 2558.637475][T27499] EXT4-fs (loop2): Invalid log block size: 64 [ 2558.692681][T27499] loop2: detected capacity change from 0 to 264192 [ 2558.704453][T27499] EXT4-fs (loop2): Invalid log block size: 64 12:10:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x500, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000ffffffbff0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:05 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef020001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:05 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x32, 0x0, 0x10000000009}) 12:10:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a94100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:05 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) rt_sigqueueinfo(r2, 0x33, &(0x7f0000000400)={0x0, 0x0, 0xfffffffffffffff9}) ptrace$getregset(0x4204, r2, 0x202, &(0x7f0000000100)={&(0x7f0000000000)=""/32, 0x20}) sched_setattr(r2, &(0x7f0000000000)={0x38, 0x1, 0x74, 0x8, 0x7, 0x7ff, 0x0, 0x1, 0x9, 0x2}, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) 12:10:05 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef030001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f0003ffff0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2559.738830][T27517] loop2: detected capacity change from 0 to 264192 [ 2559.752508][T27517] EXT4-fs (loop2): Invalid log block size: 65 12:10:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000ffff7ffff0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:05 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef050001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2559.792704][T27517] loop2: detected capacity change from 0 to 264192 [ 2559.821633][T27517] EXT4-fs (loop2): Invalid log block size: 65 12:10:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000ffffbffff0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a94200000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) [ 2559.933019][T27534] loop2: detected capacity change from 0 to 264192 [ 2559.975049][T27534] EXT4-fs (loop2): Invalid log block size: 66 12:10:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x600, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:05 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef060001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000ff9fdffff0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2560.043090][T27534] loop2: detected capacity change from 0 to 264192 [ 2560.061635][T27534] EXT4-fs (loop2): Invalid log block size: 66 12:10:06 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x33, 0x0, 0x10000000009}) 12:10:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000ffdfdffff0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:06 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f0000000040)) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r2, 0xc0305302, &(0x7f0000000040)) write$P9_RREADLINK(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="832816d0256b14871e", @ANYRESOCT=r1, @ANYRESDEC], 0xffffffe3) lremovexattr(&(0x7f0000000000)='./bus\x00', &(0x7f0000000080)=@known='trusted.overlay.origin\x00') ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) r3 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r3, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r3, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0xd6, 0x2, 0x40, 0x5, 0x0, 0x151c, 0x698d8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_config_ext={0x3dd, 0x4}, 0x800, 0xa9, 0x0, 0x3, 0xff, 0x8001, 0x6, 0x0, 0x5, 0x0, 0x3}, 0x0, 0x0, r3, 0x1) 12:10:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a94300000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:06 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef0e0001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f7fffffff0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:06 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x34, 0x0, 0x10000000009}) [ 2560.672705][T27550] loop2: detected capacity change from 0 to 264192 [ 2560.685282][T27550] EXT4-fs (loop2): Invalid log block size: 67 12:10:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f85ffffff0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:06 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef0f0001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2560.752696][T27550] loop2: detected capacity change from 0 to 264192 [ 2560.764817][T27550] EXT4-fs (loop2): Invalid log block size: 67 12:10:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x604, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f8cffffff0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:06 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53effe0001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a94400000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000fdaffffff0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2561.047614][T27574] loop2: detected capacity change from 0 to 264192 [ 2561.072955][T27574] EXT4-fs (loop2): Invalid log block size: 68 [ 2561.197735][T27574] loop2: detected capacity change from 0 to 264192 [ 2561.205695][T27574] EXT4-fs (loop2): Invalid log block size: 68 12:10:07 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000080)=0x2000) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0), 0x42, 0x0) fcntl$setflags(r1, 0x2, 0x1) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r2, 0xc0305302, &(0x7f0000000040)) fallocate(r2, 0x56, 0x8000000000000400, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$sndseq(r4, &(0x7f0000000240)=[{0x1, 0x80, 0x0, 0xc, @time={0x3, 0xfffffffb}, {0x69, 0x9}, {0x0, 0x2}, @quote={{0x1, 0x2}, 0x101, &(0x7f0000000200)={0x3f, 0x0, 0xfe, 0x0, @tick=0x8, {0xff, 0x3}, {0x6, 0x4}, @raw32={[0x5, 0x1000, 0x6]}}}}], 0x1c) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r3, 0xc0305302, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r3, 0x40505330, &(0x7f0000000140)={{0x20, 0x7f}, {0x1, 0x1}, 0xa0b, 0x7, 0x40}) pwrite64(0xffffffffffffffff, &(0x7f0000000100)="c0f697fbc85581c19661ab2c37dbe34399", 0x11, 0x9) 12:10:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000fe2ffffff0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:07 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef000601000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:07 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x35, 0x0, 0x10000000009}) 12:10:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a94500000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) [ 2561.538555][T27584] loop2: detected capacity change from 0 to 264192 12:10:07 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x36, 0x0, 0x10000000009}) 12:10:07 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef000701000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2561.593730][T27584] loop2: detected capacity change from 0 to 264192 12:10:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x1008, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000ff4ffffff0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a94600000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:07 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53effeff01000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000ff6ffffff0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2561.780447][T27603] loop2: detected capacity change from 0 to 264192 [ 2561.819624][T27603] EXT4-fs (loop2): Invalid log block size: 70 [ 2561.893414][T27603] loop2: detected capacity change from 0 to 264192 [ 2561.909335][T27603] EXT4-fs (loop2): Invalid log block size: 70 12:10:08 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x10000000009}) 12:10:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000ffbffffff0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:08 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010600000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a94700000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:08 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x37, 0x0, 0x10000000009}) [ 2562.439650][T27615] loop2: detected capacity change from 0 to 264192 [ 2562.453562][T27615] EXT4-fs (loop2): Invalid log block size: 71 12:10:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000ffeffffff0000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:08 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010700000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2562.523038][T27615] loop2: detected capacity change from 0 to 264192 [ 2562.538084][T27615] EXT4-fs (loop2): Invalid log block size: 71 12:10:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x2000, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000200000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a94800000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:08 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010201000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000300000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2562.682964][T27634] loop2: detected capacity change from 0 to 264192 [ 2562.699945][T27634] EXT4-fs (loop2): Invalid log block size: 72 [ 2562.772664][T27634] loop2: detected capacity change from 0 to 264192 [ 2562.787675][T27634] EXT4-fs (loop2): Invalid log block size: 72 12:10:09 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) 12:10:09 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010301000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000400000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a94900000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:09 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x38, 0x0, 0x10000000009}) 12:10:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000500000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2563.355853][T27650] loop2: detected capacity change from 0 to 264192 [ 2563.373787][T27650] EXT4-fs (loop2): Invalid log block size: 73 12:10:09 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010401000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x2600, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000600000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2563.424253][T27650] loop2: detected capacity change from 0 to 264192 [ 2563.436586][T27650] EXT4-fs (loop2): Invalid log block size: 73 12:10:09 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010501000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a94a00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000700000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2563.557168][T27672] loop2: detected capacity change from 0 to 264192 [ 2563.587545][T27672] EXT4-fs (loop2): Invalid log block size: 74 [ 2563.652966][T27672] loop2: detected capacity change from 0 to 264192 [ 2563.671571][T27672] EXT4-fs (loop2): Invalid log block size: 74 12:10:09 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) r2 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000200), 0x8a201, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r3, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r3, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) pidfd_getfd(0xffffffffffffffff, r2, 0x0) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f00000001c0)={0x4, &(0x7f0000000180)=[{}, {}, {}, {}]}) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)=0x0) tkill(r5, 0x2b) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) r6 = syz_open_dev$vcsu(&(0x7f0000000080), 0xba6b, 0x80) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000100)={@mcast1, 0x70, 0x0, 0x1, 0x5, 0x79, 0x5}, &(0x7f0000000140)=0x20) 12:10:09 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x39, 0x0, 0x10000000009}) 12:10:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000080700000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:09 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010601000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a94b00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000800000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2564.013826][T27681] loop2: detected capacity change from 0 to 264192 [ 2564.035480][T27681] EXT4-fs (loop2): Invalid log block size: 75 12:10:09 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010701000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2564.113748][T27681] loop2: detected capacity change from 0 to 264192 [ 2564.141642][T27681] EXT4-fs (loop2): Invalid log block size: 75 12:10:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x3f00, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000080800000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:10 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010801000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a94c00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) [ 2564.400410][T27697] loop2: detected capacity change from 0 to 264192 [ 2564.416473][T27697] EXT4-fs (loop2): Invalid log block size: 76 12:10:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000900000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2564.474904][T27697] loop2: detected capacity change from 0 to 264192 [ 2564.489761][T27697] EXT4-fs (loop2): Invalid log block size: 76 12:10:10 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) creat(&(0x7f0000000000)='./bus\x00', 0xcf) [ 2564.900925][T27790] EXT4-fs (sda1): Delayed block allocation failed for inode 1200 at logical offset 2337 with max blocks 1549 with error 28 [ 2564.913813][T27790] EXT4-fs (sda1): This should not happen!! Data will be lost [ 2564.913813][T27790] [ 2564.923391][T27790] EXT4-fs (sda1): Total free blocks count 0 [ 2564.929267][T27790] EXT4-fs (sda1): Free/Dirty block details [ 2564.935078][T27790] EXT4-fs (sda1): free_blocks=24744 [ 2564.940262][T27790] EXT4-fs (sda1): dirty_blocks=20648 [ 2564.945554][T27790] EXT4-fs (sda1): Block reservation details 12:10:10 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x3a, 0x0, 0x10000000009}) 12:10:10 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef011801000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000a00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a94d00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) [ 2564.951462][T27790] EXT4-fs (sda1): i_reserved_data_blocks=1549 12:10:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000b00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2565.012520][T27712] loop2: detected capacity change from 0 to 264192 [ 2565.027090][T27712] EXT4-fs (loop2): Invalid log block size: 77 12:10:10 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef012601000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2565.082799][T27712] loop2: detected capacity change from 0 to 264192 [ 2565.097792][T27712] EXT4-fs (loop2): Invalid log block size: 77 12:10:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x4000, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000c00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:11 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef017e01000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a94e00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) [ 2565.300206][T27732] loop2: detected capacity change from 0 to 264192 12:10:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000d00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2565.348361][T27732] EXT4-fs (loop2): Invalid log block size: 78 [ 2565.413430][T27732] loop2: detected capacity change from 0 to 264192 [ 2565.432289][T27732] EXT4-fs (loop2): Invalid log block size: 78 12:10:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000f00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:11 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef018401000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a94f00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:11 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x3b, 0x0, 0x10000000009}) 12:10:11 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) io_setup(0x8, &(0x7f0000000600)=0x0) recvmmsg$unix(r0, &(0x7f0000001740), 0x6, 0x2102a11ab3bf8528, &(0x7f00000018c0)={0x77359400}) r2 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x9, 0x9, 0xfc, 0x5, 0x0, 0x5, 0x92000, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0xa}, 0x200, 0x0, 0xb4, 0x7, 0x5, 0x2, 0xff, 0x0, 0x1}, 0x0, 0x9, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) io_submit(r1, 0x1, &(0x7f0000000200)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r4, 0x0}]) fcntl$setpipe(r4, 0x407, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000007c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYRES32=0xee00, @ANYRES32=0xee01, @ANYBLOB='./filg0\x00']) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f00000001c0)='./bus\x00', 0x572, 0x8, &(0x7f0000000700)=[{&(0x7f00000002c0)="2e76fbd7904fdb8cf8c7505c3eeb87304eba4d3b9c2794e5d3026656881e1af7599691b81a9ee96e9af617600ac24cee033d868448ba922a364ea5cd61ef2b486038aee533678bc3c9e62ed8c81f866451abc1d5a4e3f862e72c81bdf9b6cc44813704666862c47c9cd57efb22ffe41bfaa8241bdcd788f5be60f5f55851d18c4ae369", 0x83, 0x4}, {&(0x7f00000008c0)="db02838ef01c004716762626dded2aa5d78bb432cfef5c3ce295606d795137052c476931635d20507121d7ad115f1c2970af5fcb714e30b248261376c9c1454776e5d277e1d9f50440435f52a37f003409da6d8ba89eb12e8f6bbc", 0x54, 0x100}, {&(0x7f0000000240)="691a480568081ccc5bbe480e3621450c154cc817804da4a3e6e3358bd940e7fcb0582e27573fd4f0868a4ad7de24779495c6a2387110", 0x36, 0xe06d}, {&(0x7f0000000400)="c70f44c3609f535671179d3065214ce1d167b70599a2e41b7cf16b8ecc14d556ec650876e34d2178e775f421c7fe508edd5904a434377379758d2ce71c731b362c5d462c5a6e71d6bfa323050061356a9ad0f30ed25f4440de7e9ca87fe26873567d2d431a3b", 0xfffffd9c, 0xfffffffffffff2d6}, {&(0x7f0000000480)="4a0e356ec0f247f21aa8d3f22fcf57958da6c4c34ec2cf5e2d4d0408df6a9cb3b2bdfa311a476ea4c6cca922137f884b04d728c12a681468d54adb2ea8484f5765e94dce541cd5d542872fed46c1ac2925f3e7da8c1084b9a59ca42dc67863b6fc0ea3ce698da0167269bc0e691a0f4cbd48317c0e35732886", 0x79, 0xf4}, {&(0x7f0000000500)="fa9623a0722e5444621f2ae9b1f4d0dc88a4431d224aedc91fff1b09d3464cadd5e1d928a77cf929aa6d8a59be204eeb2dee5f96dc4f43946cd6b29e69835044ee3334d150eee24c8470a38b48552eb5438fbb68c133c3c9c90eb159ee3992b4ce4a7465cb6d505c3da4eacfd061", 0x6e, 0x7}, {&(0x7f0000000580)="7d6403e563120c9ec2fc4a8f324683e05cc5de279805dd51d9a722d754f52443f2b4f04db6ea91b683164aa07a909343076394b567cc5c067131aee0fa16354116c9e2a881ab0800", 0x48, 0x5}, {&(0x7f0000000640)="b3f8d1ea62f95595d2a49e7c5f74f53209007a1a12e42016b10866088847480561bbbed2e40e5e29d583076e2f7b7c7becbd40e3181bd9db683fff066e45f2d8f6b970fc2dd2fd731da9b4c7b159e8c71f73625e1ecfaad38762235f4844b3c2dbf75068c9453584241b4cb5b5f2ae34e6ef8b2f4aef799fa68737cf38d292467912da1dd453d363f798aba783c223bb5b9bc6c170fc043851eb8e9fc67492f780946aecc31e271720fe7e56146d9ecad6e20b81c15ff0", 0xb7, 0x1800}], 0x34084, &(0x7f0000000800)={[{@errors_continue}, {@data_ordered}, {@nouid32}], [{@fowner_lt={'fowner<', r6}}, {@fsname}, {@fowner_gt={'fowner>', r7}}, {@uid_gt}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) r8 = syz_open_dev$evdev(&(0x7f0000000000), 0x200, 0x800) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r0) sendfile(r0, r8, &(0x7f0000000080)=0xfffffffffffffff8, 0x6) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) ioctl$F2FS_IOC_START_ATOMIC_WRITE(0xffffffffffffffff, 0xf501, 0x0) 12:10:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x7e00, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000001000000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2566.037518][T27745] loop2: detected capacity change from 0 to 264192 [ 2566.072214][T27745] EXT4-fs (loop2): Invalid log block size: 79 12:10:11 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef01fe01000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000101000000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2566.124527][T27745] loop2: detected capacity change from 0 to 264192 [ 2566.147245][T27745] EXT4-fs (loop2): Invalid log block size: 79 12:10:12 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010003000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000001100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a95000000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000001200000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:12 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010005000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2566.265534][T27771] loop2: detected capacity change from 0 to 264192 [ 2566.299690][T27771] EXT4-fs (loop2): Invalid log block size: 80 12:10:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000001400000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2566.362740][T27771] loop2: detected capacity change from 0 to 264192 [ 2566.369790][T27771] EXT4-fs (loop2): Invalid log block size: 80 12:10:12 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x3c, 0x0, 0x10000000009}) 12:10:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000fffff88814cbd601800000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:13 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010006000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000a95100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x8400, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:13 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000080)={0x0, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) rt_sigqueueinfo(r2, 0x33, &(0x7f0000000400)={0x0, 0x0, 0xfffffffffffffff9}) ptrace$getregset(0x4204, r2, 0x202, &(0x7f0000000100)={&(0x7f0000000000)=""/32, 0x20}) sched_setattr(r2, &(0x7f0000000100)={0x38, 0x0, 0x7c, 0x10001, 0x6, 0x2, 0xffffffffffffe9ac, 0x100, 0xc7, 0x9}, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x10000000009}) 12:10:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000fffff88814cb78c1800000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2567.151753][T27790] EXT4-fs (sda1): Delayed block allocation failed for inode 1167 at logical offset 1279 with max blocks 1550 with error 28 [ 2567.164576][T27790] EXT4-fs (sda1): This should not happen!! Data will be lost [ 2567.164576][T27790] [ 2567.179506][T27789] loop2: detected capacity change from 0 to 264192 12:10:13 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef01000e000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000fffff88814c80de1800000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2567.232434][T27789] loop2: detected capacity change from 0 to 264192 12:10:13 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x3d, 0x0, 0x10000000009}) 12:10:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000002000000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2567.331580][T27789] EXT4-fs (loop2): Invalid log block size: 81 12:10:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000005400000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:13 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef01000f000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000002200000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2567.448480][T27811] loop2: detected capacity change from 0 to 264192 12:10:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000002300000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:13 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010020000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2567.489396][T27811] EXT4-fs (loop2): Invalid log block size: 84 [ 2567.542750][T27811] loop2: detected capacity change from 0 to 264192 [ 2567.560585][T27811] EXT4-fs (loop2): Invalid log block size: 84 12:10:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0xeffd, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:14 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef01003f000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000005600000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:14 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x3e, 0x0, 0x10000000009}) 12:10:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000002400000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:14 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) sched_setattr(r1, &(0x7f0000000080)={0x38, 0x1, 0x10000004, 0x6, 0x79, 0x1, 0x10001, 0x8c9, 0x7f, 0x6}, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) 12:10:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000002500000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2568.227660][T27837] loop2: detected capacity change from 0 to 264192 [ 2568.249475][T27837] EXT4-fs (loop2): Invalid log block size: 86 12:10:14 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010040000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000002e00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2568.292798][T27837] loop2: detected capacity change from 0 to 264192 [ 2568.306871][T27837] EXT4-fs (loop2): Invalid log block size: 86 12:10:14 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef01fffe000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000006400000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000003100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:14 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010002000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2568.418369][T27854] loop2: detected capacity change from 0 to 264192 [ 2568.432896][T27854] EXT4-fs (loop2): Invalid log block size: 100 [ 2568.492814][T27854] loop2: detected capacity change from 0 to 264192 [ 2568.512763][T27854] EXT4-fs (loop2): Invalid log block size: 100 12:10:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0xfdef, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000003300000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:15 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x41, 0x0, 0x10000000009}) 12:10:15 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010003000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f00000000ffffffc000000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:15 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) close(r0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) 12:10:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000003f00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2569.496974][T27873] loop2: detected capacity change from 0 to 264192 12:10:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000004000000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:15 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010005000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000005600000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2569.539748][T27873] EXT4-fs (loop2): Invalid log block size: 192 [ 2569.602914][T27873] loop2: detected capacity change from 0 to 264192 [ 2569.616089][T27873] EXT4-fs (loop2): Invalid log block size: 192 12:10:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000006400000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:15 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010006000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x200000, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000007ffffff200000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) [ 2569.949347][T27896] loop2: detected capacity change from 0 to 264192 [ 2569.962349][T27896] EXT4-fs (loop2): Invalid log block size: 242 12:10:15 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x42, 0x0, 0x10000000009}) 12:10:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000004208000000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:15 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef01000e000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2570.072826][T27896] loop2: detected capacity change from 0 to 264192 [ 2570.088432][T27896] EXT4-fs (loop2): Invalid log block size: 242 12:10:16 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) setrlimit(0x8, &(0x7f0000000000)={0x4, 0x6}) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x10000000, 0xf6, 0x7, 0x401, 0xe66, 0x5e9, 0x3, 0xffff}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) getrlimit(0xb, &(0x7f0000000100)) 12:10:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000008100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000007ffffff800000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:16 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef01000f000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000004208100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2570.339706][T27912] loop2: detected capacity change from 0 to 264192 [ 2570.352544][T27912] EXT4-fs (loop2): Invalid log block size: 248 12:10:16 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef0100fe000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000004208200000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2570.414534][T27912] loop2: detected capacity change from 0 to 264192 [ 2570.422005][T27912] EXT4-fs (loop2): Invalid log block size: 248 12:10:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0xf0ff7f, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:16 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010000060000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000007ffffff900000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:16 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x43, 0x0, 0x10000000009}) 12:10:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000004208300000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2570.830335][T27930] loop2: detected capacity change from 0 to 264192 [ 2570.852618][T27930] EXT4-fs (loop2): Invalid log block size: 249 [ 2570.912948][T27930] loop2: detected capacity change from 0 to 264192 [ 2570.928166][T27930] EXT4-fs (loop2): Invalid log block size: 249 12:10:17 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) setrlimit(0x6, &(0x7f0000000000)={0xbba, 0x4}) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) open(&(0x7f0000000140)='./bus/file0\x00', 0x902, 0x48) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)='./bus/file0\x00', 0xc, 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) 12:10:17 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010000070000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000004208400000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f00000000fffffffe00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:17 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x44, 0x0, 0x10000000009}) [ 2571.217613][T27941] loop2: detected capacity change from 0 to 264192 [ 2571.233875][T27941] EXT4-fs (loop2): Invalid log block size: 254 12:10:17 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef0100feff0000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000004208500000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2571.272774][T27941] loop2: detected capacity change from 0 to 264192 [ 2571.295068][T27941] EXT4-fs (loop2): Invalid log block size: 254 12:10:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x1000000, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000004208600000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000003ffff00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:17 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010046041f00ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:17 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x45, 0x0, 0x10000000009}) [ 2571.770963][T27963] loop2: detected capacity change from 0 to 264192 [ 2571.804809][T27963] EXT4-fs (loop2): Invalid log block size: 255 [ 2571.855005][T27963] loop2: detected capacity change from 0 to 264192 [ 2571.891582][T27963] EXT4-fs (loop2): Invalid log block size: 255 12:10:18 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef0100feffffffddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000004208700000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:18 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="5500000018007f01c0fe15b282a380930a50000248a84302916d0200390009002300ff6c0200000015000500fc000000070b566881b18432009b1100b1df13000000fb0009000000000000000de3b3000000000900", 0x55}], 0x1}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lstat(&(0x7f0000000000)='./bus\x00', &(0x7f0000000100)) sched_setattr(0x0, 0x0, 0x0) recvmmsg$unix(r1, &(0x7f0000001c40)=[{{&(0x7f0000000640), 0x6e, &(0x7f0000001980)=[{&(0x7f00000002c0)=""/4, 0x4}, {&(0x7f00000006c0)=""/221, 0xdd}, {&(0x7f00000007c0)=""/44, 0x2c}, {&(0x7f0000000800)=""/55, 0x37}, {&(0x7f0000000840)=""/4096, 0x1000}, {&(0x7f0000001840)=""/139, 0x8b}, {&(0x7f0000001900)=""/99, 0x63}], 0x7, &(0x7f0000001a00)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @rights={{0x10}}], 0xe8}}, {{&(0x7f0000001b00)=@abs, 0x6e, &(0x7f0000001bc0)=[{&(0x7f0000001b80)=""/45, 0x2d}], 0x1, &(0x7f0000001c00)}}], 0x2, 0x10002, 0x0) clone3(&(0x7f0000000540)={0x402c0800, &(0x7f0000000600), &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x8}, &(0x7f0000000380)=""/104, 0x68, &(0x7f0000000480)=""/102, &(0x7f0000001cc0)=[0xffffffffffffffff, 0x0, r2, r2], 0x4, {r1}}, 0x58) prlimit64(r3, 0x7, &(0x7f00000005c0)={0x5, 0x100000001}, 0x0) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000140)={0x0, 0x0}) ptrace$setopts(0x4206, r5, 0x0, 0x0) rt_sigqueueinfo(r5, 0x33, &(0x7f0000000400)={0x0, 0x0, 0xfffffffffffffff9}) ptrace$getregset(0x4204, r5, 0x202, &(0x7f0000000100)={&(0x7f0000000000)=""/32, 0x20}) sched_setattr(r5, &(0x7f0000000240)={0x38, 0x0, 0x20, 0x4, 0x8, 0x0, 0x6, 0x80000000, 0x8000, 0x3}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) getrlimit(0xa, &(0x7f0000000500)) sched_setattr(0xffffffffffffffff, &(0x7f0000000200)={0x38, 0x5, 0xc, 0x2, 0x80, 0xffffffffffffffc1, 0x80c, 0xffffffffffffff87, 0x0, 0x1}, 0x0) 12:10:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000007fffffff00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:18 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x46, 0x0, 0x10000000009}) 12:10:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000004208800000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2572.198919][T27978] loop2: detected capacity change from 0 to 264192 [ 2572.218570][T27978] EXT4-fs (loop2): Invalid log block size: 255 12:10:18 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001020000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2572.272785][T27978] loop2: detected capacity change from 0 to 264192 [ 2572.290752][T27978] EXT4-fs (loop2): Invalid log block size: 255 12:10:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000004208900000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000002000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x2000000, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:18 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001030000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2572.657579][T27996] loop2: detected capacity change from 0 to 264192 [ 2572.702833][T27996] EXT4-fs (loop2): bad geometry: first data block 131072 is beyond end of filesystem (128) 12:10:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000008a00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:18 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x47, 0x0, 0x10000000009}) [ 2572.793598][T27996] loop2: detected capacity change from 0 to 264192 [ 2572.809029][T27996] EXT4-fs (loop2): bad geometry: first data block 131072 is beyond end of filesystem (128) [ 2573.044059][T11899] EXT4-fs: 14 callbacks suppressed [ 2573.044102][T11899] EXT4-fs (sda1): Delayed block allocation failed for inode 1205 at logical offset 84 with max blocks 326 with error 28 [ 2573.061783][T11899] EXT4-fs (sda1): This should not happen!! Data will be lost [ 2573.061783][T11899] [ 2573.071315][T11899] EXT4-fs (sda1): Total free blocks count 0 [ 2573.077286][T11899] EXT4-fs (sda1): Free/Dirty block details [ 2573.083111][T11899] EXT4-fs (sda1): free_blocks=24744 [ 2573.088300][T11899] EXT4-fs (sda1): dirty_blocks=19425 12:10:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000004208a00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:18 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001040000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000003000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:18 executing program 3: recvmmsg$unix(0xffffffffffffffff, &(0x7f0000004140)=[{{&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000001580)=[{&(0x7f0000000180)=""/181, 0xb5}, {&(0x7f0000000000)=""/54, 0x36}, {&(0x7f00000002c0)=""/226, 0xe2}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/226, 0xe2}, {&(0x7f00000014c0)=""/134, 0x86}], 0x6, &(0x7f0000001600)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xd8}}, {{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000080)}, {&(0x7f0000000240)=""/5, 0x5}, {&(0x7f0000001700)=""/4096, 0x1000}, {&(0x7f0000002700)=""/92, 0x5c}], 0x4, &(0x7f00000027c0)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}}, {{&(0x7f0000002800)=@abs, 0x6e, &(0x7f0000002d40)=[{&(0x7f0000002880)=""/73, 0x49}, {&(0x7f0000002900)=""/190, 0xbe}, {&(0x7f00000029c0)=""/220, 0xdc}, {&(0x7f0000002ac0)=""/244, 0xf4}, {&(0x7f0000002bc0)=""/176, 0xb0}, {&(0x7f0000002c80)=""/121, 0x79}, {&(0x7f0000002d00)=""/5, 0x5}], 0x7, &(0x7f0000002dc0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xe8}}, {{&(0x7f0000002ec0)=@abs, 0x6e, &(0x7f0000004000)=[{&(0x7f0000002f40)=""/190, 0xbe}, {&(0x7f0000003000)=""/4096, 0x1000}], 0x2, &(0x7f0000004040)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xf8}}], 0x4, 0x40, &(0x7f0000004240)={0x0, 0x3938700}) prlimit64(r0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008a}, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) [ 2573.093602][T11899] EXT4-fs (sda1): Block reservation details [ 2573.099551][T11899] EXT4-fs (sda1): i_reserved_data_blocks=326 12:10:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000004208b00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:19 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001050000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2573.151151][T28011] loop2: detected capacity change from 0 to 264192 [ 2573.178469][T28011] EXT4-fs (loop2): bad geometry: first data block 196608 is beyond end of filesystem (128) 12:10:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000004208c00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2573.263436][T28011] loop2: detected capacity change from 0 to 264192 [ 2573.277604][T28011] EXT4-fs (loop2): bad geometry: first data block 196608 is beyond end of filesystem (128) 12:10:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x2040000, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:19 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001060000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000004000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000004208d00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2573.535934][T28029] loop2: detected capacity change from 0 to 264192 [ 2573.558733][T28029] EXT4-fs (loop2): bad geometry: first data block 262144 is beyond end of filesystem (128) [ 2573.612485][T28029] loop2: detected capacity change from 0 to 264192 [ 2573.631954][T28029] EXT4-fs (loop2): bad geometry: first data block 262144 is beyond end of filesystem (128) 12:10:19 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x48, 0x0, 0x10000000009}) 12:10:19 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001070000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000004208e00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2574.026533][T11899] EXT4-fs (sda1): Delayed block allocation failed for inode 1180 at logical offset 136 with max blocks 753 with error 28 [ 2574.039178][T11899] EXT4-fs (sda1): This should not happen!! Data will be lost [ 2574.039178][T11899] 12:10:19 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r0, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) ioctl$TIOCL_UNBLANKSCREEN(r0, 0x541c, &(0x7f0000000100)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) setrlimit(0x2, &(0x7f0000000080)={0x3, 0x10001}) sched_setattr(0x0, 0x0, 0x0) setrlimit(0x4, &(0x7f0000000000)={0x0, 0x8001}) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) 12:10:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000005000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000004208f00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:19 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001080000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:20 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001180000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2574.125916][T28050] loop2: detected capacity change from 0 to 264192 [ 2574.141367][T28050] EXT4-fs (loop2): bad geometry: first data block 327680 is beyond end of filesystem (128) [ 2574.203037][T28050] loop2: detected capacity change from 0 to 264192 [ 2574.213225][T28050] EXT4-fs (loop2): bad geometry: first data block 327680 is beyond end of filesystem (128) 12:10:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x3000000, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000004209000000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:20 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) rmdir(&(0x7f0000000000)='./bus\x00') sched_setattr(0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x43}}, './bus\x00'}) fchdir(r1) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) 12:10:20 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001260000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:20 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x49, 0x0, 0x10000000009}) 12:10:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000006000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000004209100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:20 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef0100017e0000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000004209200000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:20 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001840000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000004209300000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2574.779462][T28082] loop2: detected capacity change from 0 to 264192 [ 2574.798571][T28082] EXT4-fs (loop2): bad geometry: first data block 393216 is beyond end of filesystem (128) 12:10:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000004209400000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2574.899484][T28082] loop2: detected capacity change from 0 to 264192 [ 2574.914566][T28082] EXT4-fs (loop2): bad geometry: first data block 393216 is beyond end of filesystem (128) 12:10:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x4000000, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:21 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) utime(&(0x7f0000000000)='./bus\x00', &(0x7f0000000080)={0x7f, 0x1}) 12:10:21 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x4a, 0x0, 0x10000000009}) 12:10:21 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001fe0000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000004209500000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000007000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:21 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001040200ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2575.187346][T28092] loop2: detected capacity change from 0 to 264192 [ 2575.225027][T28092] EXT4-fs (loop2): bad geometry: first data block 458752 is beyond end of filesystem (128) 12:10:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000029600000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000004209600000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:21 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000300ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000029700000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2575.323427][T28092] loop2: detected capacity change from 0 to 264192 [ 2575.352738][T28092] EXT4-fs (loop2): bad geometry: first data block 458752 is beyond end of filesystem (128) 12:10:21 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001020400ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x5000000, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:21 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) recvmmsg$unix(r0, &(0x7f0000002200)=[{{&(0x7f0000000100), 0x6e, &(0x7f0000000000)=[{&(0x7f0000000180)=""/133, 0x85}, {&(0x7f00000002c0)=""/204, 0xcc}, {&(0x7f00000003c0)=""/4096, 0x1000}], 0x3, &(0x7f00000013c0)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x120}}, {{&(0x7f0000001500), 0x6e, &(0x7f0000001900)=[{&(0x7f0000000080)=""/60, 0x3c}, {&(0x7f0000001580)=""/87, 0x57}, {&(0x7f0000001600)=""/236, 0xec}, {&(0x7f0000001700)=""/139, 0x8b}, {&(0x7f00000017c0)=""/128, 0x80}, {&(0x7f0000001840)=""/143, 0x8f}], 0x6, &(0x7f0000001980)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x78}}, {{&(0x7f0000001a00)=@abs, 0x6e, &(0x7f0000001e40)=[{&(0x7f0000001a80)=""/131, 0x83}, {&(0x7f0000001b40)=""/242, 0xf2}, {&(0x7f0000000240)=""/2, 0x2}, {&(0x7f0000001c40)=""/251, 0xfb}, {&(0x7f0000001d40)=""/53, 0x35}, {&(0x7f0000001d80)}, {&(0x7f0000001dc0)=""/30, 0x1e}, {&(0x7f0000001e00)=""/31, 0x1f}], 0x8, &(0x7f0000001ec0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x50}}, {{&(0x7f0000001f40), 0x6e, &(0x7f0000002180)=[{&(0x7f0000001fc0)=""/20, 0x14}, {&(0x7f0000002000)=""/206, 0xce}, {&(0x7f0000002100)=""/75, 0x4b}], 0x3, &(0x7f00000021c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x40}}], 0x4, 0x4000, 0x0) sendfile(r0, r1, &(0x7f0000002300)=0xdb66, 0x36e4) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) 12:10:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000008000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000004209700000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:21 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x4b, 0x0, 0x10000000009}) 12:10:21 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001060400ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000004209800000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2576.143752][T28129] loop2: detected capacity change from 0 to 264192 [ 2576.181478][T28129] EXT4-fs (loop2): bad geometry: first data block 524288 is beyond end of filesystem (128) 12:10:22 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000500ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000fffff8881422f389800000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:22 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000600ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2576.253218][T28129] loop2: detected capacity change from 0 to 264192 [ 2576.271493][T28129] EXT4-fs (loop2): bad geometry: first data block 524288 is beyond end of filesystem (128) 12:10:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000fffff888130623a9800000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000009000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) [ 2576.426958][T28150] loop2: detected capacity change from 0 to 264192 [ 2576.444524][T28150] EXT4-fs (loop2): bad geometry: first data block 589824 is beyond end of filesystem (128) [ 2576.492684][T28150] loop2: detected capacity change from 0 to 264192 [ 2576.511815][T28150] EXT4-fs (loop2): bad geometry: first data block 589824 is beyond end of filesystem (128) 12:10:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x6000000, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:22 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xfffffffffffffffd, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) creat(&(0x7f0000000000)='./bus\x00', 0x18) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) lremovexattr(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)=@random={'system.', '-\x00'}) 12:10:22 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001040600ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000fffff888105d1409800000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f00000000000a000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:22 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x4c, 0x0, 0x10000000009}) 12:10:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000fffff88810719469800000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:22 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000700ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2577.025963][T28159] loop2: detected capacity change from 0 to 264192 [ 2577.054851][T28159] EXT4-fs (loop2): bad geometry: first data block 655360 is beyond end of filesystem (128) 12:10:23 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001001800ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000fffff88814cb7839800000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2577.114639][T28159] loop2: detected capacity change from 0 to 264192 [ 2577.130433][T28159] EXT4-fs (loop2): bad geometry: first data block 655360 is beyond end of filesystem (128) 12:10:23 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001002600ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f00000000000b000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) [ 2577.249835][T28183] loop2: detected capacity change from 0 to 264192 [ 2577.295927][T28183] EXT4-fs (loop2): bad geometry: first data block 720896 is beyond end of filesystem (128) [ 2577.382820][T28183] loop2: detected capacity change from 0 to 264192 [ 2577.395795][T28183] EXT4-fs (loop2): bad geometry: first data block 720896 is beyond end of filesystem (128) 12:10:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x6040000, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:23 executing program 3: execve(&(0x7f0000000240)='./bus\x00', &(0x7f0000000600)=[&(0x7f0000000400)='wlan1\x00', &(0x7f0000000440)='wfdno', &(0x7f0000000480)='-,\xf5-:\x00', &(0x7f00000004c0)='$.^.$\x9f(,)\\\\:--%&)&\x00', &(0x7f0000000500), &(0x7f0000000900)='mmap\xeb~f*bV\xda\x00\xe4++/M\xcc\xcd\x14\xdfI\xe4\x1e\xff\xde[l3E\xab\xea\x8c\x05-\x17\x00\xcc\f\x98\xfb\xdd\xa4X`\x13c\xe7?\xa1s0\xcd\xfc\xa5\xc2\xd2\x88\xe1~C;;\x87\xb2\xf3\xf8J\x1cC?\x1d\xed\fIS\xa9\x1b\xa4GG{\xd5\xfb\xa5\xfd\x84\r\xb0\xff\xb8\x9c)\xfbC\x9d\x03\xf0b\xb4NWKK_\xec56\x1d\t\xec', &(0x7f0000000580)='cache=fscache', &(0x7f00000005c0)='.}]\x00'], &(0x7f0000000880)=[&(0x7f0000000640)='fscache', &(0x7f0000000680)='#:-${,&\x00', &(0x7f00000006c0)='\x00', &(0x7f0000000700)='9p\x00', &(0x7f0000000740)='staff_u', &(0x7f0000000780)='/dev/snd/seq\x00', &(0x7f00000007c0)=':--(!}&\x00', &(0x7f0000000800)='^.\x00', &(0x7f0000000500)='measurex\xb3\xe0SCZ\x1e\xce\xba1~5VhF\xdd\x90\x8a\xbe']) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) setrlimit(0xc, &(0x7f0000000200)={0x9, 0x6}) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r1, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r1, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCDELRT(r2, 0x890c, &(0x7f0000000140)={0x0, @vsock={0x28, 0x0, 0x2710, @host}, @vsock={0x28, 0x0, 0x2710, @local}, @ethernet={0x306, @broadcast}, 0x8001, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000000)='macvlan0\x00', 0x7c, 0x100, 0x5}) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r3, 0xc0305302, &(0x7f0000000040)) mount$9p_fd(0x0, &(0x7f0000000080)='./bus\x00', &(0x7f00000001c0), 0x840, &(0x7f0000000980)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@access_user}, {@mmap}, {@access_client}, {@cache_loose}, {@uname={'uname', 0x3d, 'j6'}}, {@fscache}, {@access_client}, {@uname={'uname', 0x3d, '\xff\xff\xff\xff\xff\xff'}}, {@cache_fscache}], [{@smackfsroot={'smackfsroot', 0x3d, '\xff\xff\xff\xff\xff\xff'}}, {@measure}, {@dont_hash}, {@hash}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@appraise}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '+/}.'}}, {@uid_lt={'uid<', 0xee00}}, {@obj_type={'obj_type', 0x3d, 'wlan1\x00'}}]}}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) 12:10:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000fffff88813154c09800000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:23 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001003f00ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f00000000000c000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:23 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x4d, 0x0, 0x10000000009}) [ 2577.981362][T28191] loop2: detected capacity change from 0 to 264192 12:10:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000fffff88814c08c49800000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2578.024204][T28191] EXT4-fs (loop2): bad geometry: first data block 786432 is beyond end of filesystem (128) 12:10:23 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001004000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000fffff88814c80d79800000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:24 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001007e00ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000004209900000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2578.144090][T28191] loop2: detected capacity change from 0 to 264192 [ 2578.162127][T28191] EXT4-fs (loop2): bad geometry: first data block 786432 is beyond end of filesystem (128) 12:10:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000004209a00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2578.333925][T11899] ================================================================== [ 2578.342033][T11899] BUG: KCSAN: data-race in ext4_write_end / mpage_process_page_bufs [ 2578.350028][T11899] [ 2578.352337][T11899] write to 0xffff88813f982bc8 of 8 bytes by task 28199 on cpu 1: [ 2578.360049][T11899] ext4_write_end+0x16e/0x6f0 [ 2578.364744][T11899] ext4_da_write_end+0x6d/0x5e0 [ 2578.369689][T11899] generic_perform_write+0x251/0x3e0 [ 2578.374977][T11899] ext4_buffered_write_iter+0x305/0x400 [ 2578.380514][T11899] ext4_file_write_iter+0x2e7/0x11f0 [ 2578.385794][T11899] vfs_write+0x7bc/0x900 [ 2578.390030][T11899] ksys_write+0xd9/0x190 [ 2578.394269][T11899] __x64_sys_write+0x3e/0x50 [ 2578.398849][T11899] do_syscall_64+0x44/0xa0 [ 2578.403273][T11899] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2578.409164][T11899] [ 2578.411480][T11899] read to 0xffff88813f982bc8 of 8 bytes by task 11899 on cpu 0: [ 2578.419109][T11899] mpage_process_page_bufs+0x34/0x560 [ 2578.424474][T11899] mpage_prepare_extent_to_map+0x4f6/0x650 [ 2578.430285][T11899] ext4_writepages+0xa18/0x1d70 [ 2578.435148][T11899] do_writepages+0x26b/0x3c0 [ 2578.439829][T11899] __writeback_single_inode+0x80/0x440 [ 2578.445289][T11899] writeback_sb_inodes+0x563/0xd30 [ 2578.450411][T11899] wb_writeback+0x27d/0x6d0 [ 2578.455004][T11899] wb_do_writeback+0x101/0x530 [ 2578.459770][T11899] wb_workfn+0xc8/0x540 [ 2578.463925][T11899] process_one_work+0x402/0x910 [ 2578.468765][T11899] worker_thread+0x636/0xae0 [ 2578.473344][T11899] kthread+0x262/0x280 [ 2578.477404][T11899] ret_from_fork+0x1f/0x30 [ 2578.481814][T11899] [ 2578.484130][T11899] value changed: 0x0000000000161000 -> 0x0000000000162000 [ 2578.491227][T11899] [ 2578.493537][T11899] Reported by Kernel Concurrency Sanitizer on: [ 2578.499663][T11899] CPU: 0 PID: 11899 Comm: kworker/u4:2 Not tainted 5.15.0-rc7-syzkaller #0 [ 2578.508429][T11899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2578.518476][T11899] Workqueue: writeback wb_workfn (flush-8:0) [ 2578.524474][T11899] ================================================================== 12:10:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x8000000, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:24 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r1, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r1, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xfffffff7) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) 12:10:24 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001008400ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f00000000000d000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:24 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x4e, 0x0, 0x10000000009}) 12:10:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000004209b00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000004209c00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2579.046494][T28220] loop2: detected capacity change from 0 to 264192 [ 2579.080241][T28220] EXT4-fs (loop2): bad geometry: first data block 851968 is beyond end of filesystem (128) 12:10:25 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001fffe00ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000004209d00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2579.164636][T28220] loop2: detected capacity change from 0 to 264192 [ 2579.189925][T28220] EXT4-fs (loop2): bad geometry: first data block 851968 is beyond end of filesystem (128) 12:10:25 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001feff00ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000004209e00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f00000000000e000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) [ 2579.353488][T28244] loop2: detected capacity change from 0 to 264192 12:10:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x8100000, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:25 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x4) open(&(0x7f0000000000)='./bus\x00', 0x500, 0x122) r1 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r1, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r1, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) open_tree(r1, &(0x7f0000000080)='./file0\x00', 0x10100) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) 12:10:25 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000200ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000004209f00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:25 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x4f, 0x0, 0x10000000009}) [ 2579.485315][T28244] loop2: detected capacity change from 0 to 264192 [ 2579.517360][T28244] EXT4-fs (loop2): bad geometry: first data block 917504 is beyond end of filesystem (128) 12:10:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f00000000000420a000000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f00000000000f000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f00000000000420a100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2579.709978][T28260] loop2: detected capacity change from 0 to 264192 [ 2579.743581][T28260] EXT4-fs (loop2): bad geometry: first data block 983040 is beyond end of filesystem (128) 12:10:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f00000000000420a200000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f00000000000420a300000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2579.823916][T28260] loop2: detected capacity change from 0 to 264192 [ 2579.839209][T28260] EXT4-fs (loop2): bad geometry: first data block 983040 is beyond end of filesystem (128) 12:10:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f00000000000420a400000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000010000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) [ 2579.988421][T28269] loop2: detected capacity change from 0 to 264192 [ 2580.009594][T28269] EXT4-fs (loop2): bad geometry: first data block 1048576 is beyond end of filesystem (128) [ 2580.082860][T28269] loop2: detected capacity change from 0 to 264192 [ 2580.099733][T28269] EXT4-fs (loop2): bad geometry: first data block 1048576 is beyond end of filesystem (128) 12:10:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x26000000, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f00000000000420a500000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:30 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000300ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:30 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x38, 0x2, 0x11, 0x1ff, 0x3, 0x8, 0x6, 0x3a, 0x9, 0x2}, 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) 12:10:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000011000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f00000000000420a600000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:30 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x50, 0x0, 0x10000000009}) 12:10:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x3f000000, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f00000000000420a700000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:30 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000400ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2584.587519][T28737] loop2: detected capacity change from 0 to 264192 [ 2584.614851][T28737] EXT4-fs (loop2): bad geometry: first data block 1114112 is beyond end of filesystem (128) 12:10:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f00000000000420a800000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:30 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000500ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f00000000000420a900000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2584.682894][T28737] loop2: detected capacity change from 0 to 264192 [ 2584.698955][T28737] EXT4-fs (loop2): bad geometry: first data block 1114112 is beyond end of filesystem (128) 12:10:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000012000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f00000000000420aa00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2584.807273][T28759] loop2: detected capacity change from 0 to 264192 [ 2584.837069][T28759] EXT4-fs (loop2): bad geometry: first data block 1179648 is beyond end of filesystem (128) [ 2584.912902][T28759] loop2: detected capacity change from 0 to 264192 [ 2584.926514][T28759] EXT4-fs (loop2): bad geometry: first data block 1179648 is beyond end of filesystem (128) [ 2585.416920][T27790] EXT4-fs: 6 callbacks suppressed [ 2585.416980][T27790] EXT4-fs (sda1): Delayed block allocation failed for inode 1197 at logical offset 1093 with max blocks 1127 with error 28 [ 2585.435341][T27790] EXT4-fs (sda1): This should not happen!! Data will be lost [ 2585.435341][T27790] [ 2585.444899][T27790] EXT4-fs (sda1): Total free blocks count 0 [ 2585.450789][T27790] EXT4-fs (sda1): Free/Dirty block details [ 2585.456606][T27790] EXT4-fs (sda1): free_blocks=26419 [ 2585.461801][T27790] EXT4-fs (sda1): dirty_blocks=20226 12:10:31 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) r1 = pidfd_getfd(r0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x10000000009}) 12:10:31 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000600ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f00000000000012c000000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2585.467079][T27790] EXT4-fs (sda1): Block reservation details [ 2585.472978][T27790] EXT4-fs (sda1): i_reserved_data_blocks=1127 12:10:31 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x51, 0x0, 0x10000000009}) 12:10:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000013000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f00000000ffffffc000000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:31 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000700ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x40000000, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:31 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000800ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f00000000000012c300000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2585.606070][T28777] loop2: detected capacity change from 0 to 264192 [ 2585.631234][T28777] EXT4-fs (loop2): bad geometry: first data block 1245184 is beyond end of filesystem (128) 12:10:31 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001001800ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000007ffffff200000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2585.702795][T28777] loop2: detected capacity change from 0 to 264192 [ 2585.714893][T28777] EXT4-fs (loop2): bad geometry: first data block 1245184 is beyond end of filesystem (128) 12:10:32 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) setrlimit(0x8, &(0x7f0000000080)={0x4, 0x8}) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) r1 = open(&(0x7f0000000000)='./bus\x00', 0x20001, 0xc8) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r2, 0xc0305302, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r2) 12:10:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000007ffffff800000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:32 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001002600ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:32 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x52, 0x0, 0x10000000009}) 12:10:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000014000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) [ 2586.257689][T28803] loop2: detected capacity change from 0 to 264192 12:10:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000007ffffff900000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:32 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001007e00ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2586.301405][T28803] EXT4-fs (loop2): bad geometry: first data block 1310720 is beyond end of filesystem (128) 12:10:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x7e000000, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000ffffffffffffffffe00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2586.362978][T28803] loop2: detected capacity change from 0 to 264192 [ 2586.391806][T28803] EXT4-fs (loop2): bad geometry: first data block 1310720 is beyond end of filesystem (128) 12:10:32 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001008400ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000015000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f00000000000003ff00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2586.510861][T28826] loop2: detected capacity change from 0 to 264192 [ 2586.554593][T28826] EXT4-fs (loop2): bad geometry: first data block 1376256 is beyond end of filesystem (128) [ 2586.613778][T28826] loop2: detected capacity change from 0 to 264192 [ 2586.625038][T28826] EXT4-fs (loop2): bad geometry: first data block 1376256 is beyond end of filesystem (128) 12:10:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000003ffff00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:33 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef01000100fe00ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000016000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:33 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x53, 0x0, 0x10000000009}) 12:10:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x7ffff000, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:33 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r0, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000000)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x200000000008d}, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r2, 0xc0305302, &(0x7f0000000040)) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x1, 0x8, 0x502, 0x4}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={0x0, @l2tp={0x2, 0x0, @multicast1}, @in={0x2, 0x4e20, @remote}, @xdp={0x2c, 0xf, r3, 0x3a}, 0x3f}) sendmsg(0xffffffffffffffff, &(0x7f0000001840)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="b37a5336b8a48be0129f9a55a261b3d2219c85d6e79c98f94debbf1c2a7b1d313d1a66ce8ead7ce862b2a76d60ec585d87762a05706bdcbf356f2b20e3d290fda73375", 0x43}, {&(0x7f00000005c0)="4903564de754b2bfdd8450c25f5bce5856fbbae8f25954e20a52208a78f76b322efd21db735519ff060c36fc25ebdc4eae6b4813b2b17b349644ec12babc788746b66e8e62ae733f281bb7b77d8f2a1d9eb11b0b3bc2560af967cc94e4e707d69453fe136feb2b70b5e069e347e1866b289f8280dae87a4c5453601ebafaccb5a8d5100394e489fe6abb14d1583a83f3846e07e5514362459dbedff653faae93ab4cfb10fea147151cbcf86816e540e21d977ed247301f9c39a481859e8cfcd798655576a1cf2a7e9247e89badac2885deeba6c84751d685aac1123105ebc5bea9a1d1b1e691fb2a7c20fb2c5bda44c2452dbcac3a8d", 0xf6}], 0x2, &(0x7f00000006c0)=[{0x1010, 0x107, 0x1, "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"}, {0xc8, 0x110, 0x1, "ee0065716227291256bc9a3db28e6c3f4a498e658c87666bf74c586b75567cb8a351101905fe3b29fc4ba1d9415ae54c3d0614f1a6635e5a845988c1343e40ffce2f8d6e6cef6ded073d6f2defca31180101552cf9f0e573fc40b45070cbeccc859b952c12d2e663099bb62ff354e4cad186799fd24f2105c7b7eb66a29838134fb76f31b3f2ba9d857596a1a43477ae5abae90894385bf6d8efa027767411712b3241ac9896e5a07b9e95a8a1d32a4f602f7c2a1ae1d853"}, {0xa8, 0x1, 0x10000, "c76b12a7f40229f1501b65f3cc48f9c17a24fe25143e98e6c7cd0301e3b5b7312224b23c0d41da86d7f21280f80f68a4cfd1ed1717cabe5af430280622139e11fb0ec945295e1ac988c5323e3f3da6edb463c7ad7b0375c3217017f5be7e58d479cd363af1c5b27ab396296d0d570bd58feed68e94b96b81173cdc3a176998df26e4804957fd710156c746686ec451982bf79d61"}], 0x1180}, 0x40000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_REG(r4, &(0x7f0000000400)={&(0x7f0000000240), 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'a\x00'}, @NL80211_ATTR_REG_RULES={0x10, 0x22, 0x0, 0x1, [{0x4}, {0x4}, {0x4}]}]}, 0x2c}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000180)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_MESH_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x54, r5, 0x200, 0x70bd2b, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r6}, @val={0xc, 0x99, {0x100, 0x7}}}}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x4b}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x48}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x5c}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4a}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x7ff, 0x9}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x41) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000009}) [ 2587.424739][T28834] loop2: detected capacity change from 0 to 264192 12:10:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000007fffffff00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:33 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000000008d}, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_RESVSP(r1, 0x40305829, &(0x7f00000000c0)={0x0, 0x54, 0x0, 0x10000000009}) 12:10:33 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000402ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) [ 2587.482856][T28834] loop2: detected capacity change from 0 to 264192 [ 2587.516166][T28834] EXT4-fs (loop2): bad geometry: first data block 1441792 is beyond end of filesystem (128) 12:10:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000017000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000140)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d6d62a49fab280d8c0f1791ac828332e8543fdc2090cfe78ed17e9cba3d31c6dcd86472b4a031ec4ffd5e1b8516e79cfe2a4ba7", 0x70, 0x11100}], 0x804055, &(0x7f00000000c0)) 12:10:33 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000003ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}]}) 12:10:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f00000000ffffffff00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f0007ffffffffffff00000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x800002000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[]) 12:10:33 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/llc/socket\x00') sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x21, 0x70bda7, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = dup3(r0, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000480)={0x7, 'veth1_to_bond\x00', {0x6}, 0x8}) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="e607224233da4b00770fdbc6264bce78f3796b7f467712eb5635741e16c2765a5454072ab27214b2f347d5abbb428b16a45e80c4becfec0281fc1920f4a746ece7dbb121ad307cf8a2098e18ee79c48f324dbcc20ff055873b57c0b36444224beb980c024b23a097c9542d6762d87abed642cc2421094bce3883f461b05f522f9e90f4c6e8061ee97cdcbd35a459f1f784374a830b0e07", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf251800000008000300", @ANYRES32=0x0, @ANYBLOB="0a001a0008021100000100000a001a00ffffffffffff00000a0006000802110000000000"], 0x40}, 0x1, 0x0, 0x0, 0x2}, 0xc0d0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000380)) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r4, 0x8918, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @broadcast}, @xdp}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000004c0)={'nat\x00', 0x0, 0x3, 0x83, [0x4, 0x1, 0x2, 0x1, 0xc478, 0xbe3e], 0x1, &(0x7f00000003c0)=[{}], &(0x7f00000005c0)=""/131}, &(0x7f0000000680)=0x78) perf_event_open(0x0, 0x0, 0x1, r3, 0x1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000006c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0x0, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x1}, 0x10001, 0x0, 0x0, 0x1, 0x2, 0x4, 0x3e, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xe, r4, 0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f14000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000204ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000540)={[{@quota}, {@init_itable_val={'init_itable', 0x3d, 0x1}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}, {@usrjquota_path={'usrjquota', 0x3d