0056bf60 RCX: 00000000004665f9 09:28:36 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c00006c1000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x4}}, [], {0x14}}, 0x28}}, 0x0) [ 1988.645581][T12522] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 1988.653599][T12522] RBP: 00007fad613a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1988.657810][T12531] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 1988.661609][T12522] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1988.661624][T12522] R13: 00007ffeecdc550f R14: 00007fad613a1300 R15: 0000000000022000 09:28:36 executing program 0 (fault-call:1 fault-nth:2): r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 1988.702621][T12525] loop4: detected capacity change from 0 to 545 [ 1988.708072][T12531] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 1988.719969][T12525] EXT4-fs (loop4): bad geometry: block count 254 exceeds size of device (68 blocks) [ 1988.732783][T12542] tc_dump_action: action bad kind [ 1988.741394][T12531] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 1988.756356][T12544] FAULT_INJECTION: forcing a failure. [ 1988.756356][T12544] name failslab, interval 1, probability 0, space 0, times 0 [ 1988.769005][T12544] CPU: 1 PID: 12544 Comm: syz-executor.0 Not tainted 5.12.0-syzkaller #0 [ 1988.777465][T12544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1988.787591][T12544] Call Trace: [ 1988.790859][T12544] dump_stack+0x137/0x19d [ 1988.795273][T12544] should_fail+0x23c/0x250 [ 1988.799699][T12544] __should_failslab+0x81/0x90 [ 1988.804471][T12544] should_failslab+0x5/0x20 [ 1988.808983][T12544] kmem_cache_alloc_node+0x58/0x2b0 [ 1988.814182][T12544] ? __alloc_skb+0xed/0x420 [ 1988.818673][T12544] __alloc_skb+0xed/0x420 [ 1988.822996][T12544] netlink_sendmsg+0x4c7/0x7c0 [ 1988.827873][T12544] ? netlink_getsockopt+0x720/0x720 [ 1988.833121][T12544] ____sys_sendmsg+0x360/0x4d0 [ 1988.837890][T12544] ? import_iovec+0x69/0x80 [ 1988.842391][T12544] __sys_sendmsg+0x1ed/0x270 [ 1988.846981][T12544] ? __fsnotify_parent+0x32f/0x430 [ 1988.852101][T12544] ? get_pid_task+0x8b/0xc0 [ 1988.856657][T12544] ? vfs_write+0x50c/0x770 [ 1988.861062][T12544] ? __fget_light+0x21b/0x260 [ 1988.865766][T12544] ? perf_trace_sys_enter+0x4d/0x2c0 [ 1988.871050][T12544] ? fput+0x2d/0x130 [ 1988.874928][T12544] ? syscall_trace_enter+0x153/0x290 [ 1988.880214][T12544] __x64_sys_sendmsg+0x42/0x50 [ 1988.884990][T12544] do_syscall_64+0x4a/0x90 [ 1988.889424][T12544] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1988.895313][T12544] RIP: 0033:0x4665f9 09:28:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x5}}, [], {0x14}}, 0x28}}, 0x0) [ 1988.899255][T12544] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1988.918858][T12544] RSP: 002b:00007fad613a1188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1988.927286][T12544] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1988.935269][T12544] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 1988.943320][T12544] RBP: 00007fad613a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1988.952533][T12544] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1988.960515][T12544] R13: 00007ffeecdc550f R14: 00007fad613a1300 R15: 0000000000022000 [ 1988.979602][T12547] tc_dump_action: action bad kind 09:28:37 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c1eb, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:28:37 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000741000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:37 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06003a2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:28:37 executing program 0 (fault-call:1 fault-nth:3): r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x6}}, [], {0x14}}, 0x28}}, 0x0) 09:28:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000009000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 1989.377646][T12560] loop4: detected capacity change from 0 to 545 [ 1989.379565][T12564] tc_dump_action: action bad kind [ 1989.393017][T12565] FAULT_INJECTION: forcing a failure. [ 1989.393017][T12565] name failslab, interval 1, probability 0, space 0, times 0 [ 1989.405727][T12565] CPU: 0 PID: 12565 Comm: syz-executor.0 Not tainted 5.12.0-syzkaller #0 [ 1989.414176][T12565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1989.424306][T12565] Call Trace: [ 1989.427583][T12565] dump_stack+0x137/0x19d [ 1989.431916][T12565] should_fail+0x23c/0x250 [ 1989.436329][T12565] __should_failslab+0x81/0x90 [ 1989.441137][T12565] should_failslab+0x5/0x20 [ 1989.445647][T12565] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 1989.451409][T12565] ? __kmalloc_node_track_caller+0x30/0x40 [ 1989.457261][T12565] ? kmem_cache_alloc_node+0x1da/0x2b0 [ 1989.462714][T12565] __kmalloc_node_track_caller+0x30/0x40 [ 1989.468342][T12565] ? netlink_sendmsg+0x4c7/0x7c0 [ 1989.473282][T12565] __alloc_skb+0x187/0x420 [ 1989.477716][T12565] netlink_sendmsg+0x4c7/0x7c0 [ 1989.482496][T12565] ? netlink_getsockopt+0x720/0x720 [ 1989.487689][T12565] ____sys_sendmsg+0x360/0x4d0 [ 1989.492509][T12565] ? import_iovec+0x69/0x80 [ 1989.497155][T12565] __sys_sendmsg+0x1ed/0x270 [ 1989.501765][T12565] ? __fsnotify_parent+0x32f/0x430 [ 1989.506902][T12565] ? get_pid_task+0x8b/0xc0 [ 1989.511423][T12565] ? vfs_write+0x50c/0x770 [ 1989.515914][T12565] ? __fget_light+0x21b/0x260 [ 1989.520589][T12565] ? perf_trace_sys_enter+0x4d/0x2c0 [ 1989.525971][T12565] ? fput+0x2d/0x130 [ 1989.529914][T12565] ? syscall_trace_enter+0x153/0x290 [ 1989.535195][T12565] __x64_sys_sendmsg+0x42/0x50 [ 1989.539952][T12565] do_syscall_64+0x4a/0x90 [ 1989.544360][T12565] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1989.550249][T12565] RIP: 0033:0x4665f9 [ 1989.554221][T12565] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 09:28:37 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06003b2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 1989.574959][T12565] RSP: 002b:00007fad613a1188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1989.583366][T12565] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1989.591353][T12565] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 1989.599389][T12565] RBP: 00007fad613a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1989.607361][T12565] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1989.615349][T12565] R13: 00007ffeecdc550f R14: 00007fad613a1300 R15: 0000000000022000 09:28:37 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c00007a1000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:37 executing program 0 (fault-call:1 fault-nth:4): r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x7}}, [], {0x14}}, 0x28}}, 0x0) 09:28:37 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000000300fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 1989.631428][T12560] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1989.641243][T12560] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1989.651035][T12560] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 09:28:37 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06003c2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 1989.708138][T12578] FAULT_INJECTION: forcing a failure. [ 1989.708138][T12578] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1989.721240][T12578] CPU: 1 PID: 12578 Comm: syz-executor.0 Not tainted 5.12.0-syzkaller #0 [ 1989.729659][T12578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1989.739716][T12578] Call Trace: [ 1989.742997][T12578] dump_stack+0x137/0x19d [ 1989.747331][T12578] should_fail+0x23c/0x250 [ 1989.748332][T12582] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=12582 comm=syz-executor.3 [ 1989.751746][T12578] should_fail_usercopy+0x16/0x20 [ 1989.769515][T12578] _copy_from_iter_full+0x148/0xa10 [ 1989.774790][T12578] ? check_stack_object+0x61/0x70 [ 1989.779802][T12578] ? __virt_addr_valid+0x15a/0x1a0 [ 1989.784953][T12578] ? __check_object_size+0x253/0x310 [ 1989.790286][T12578] netlink_sendmsg+0x579/0x7c0 [ 1989.795197][T12578] ? netlink_getsockopt+0x720/0x720 [ 1989.800474][T12578] ____sys_sendmsg+0x360/0x4d0 [ 1989.805249][T12578] ? import_iovec+0x69/0x80 [ 1989.809764][T12578] __sys_sendmsg+0x1ed/0x270 [ 1989.814360][T12578] ? __fsnotify_parent+0x32f/0x430 [ 1989.819516][T12578] ? get_pid_task+0x8b/0xc0 [ 1989.824031][T12578] ? vfs_write+0x50c/0x770 [ 1989.828441][T12578] ? __fget_light+0x21b/0x260 [ 1989.833128][T12578] ? perf_trace_sys_enter+0x4d/0x2c0 [ 1989.838471][T12578] ? fput+0x2d/0x130 [ 1989.842445][T12578] ? syscall_trace_enter+0x153/0x290 [ 1989.847765][T12578] __x64_sys_sendmsg+0x42/0x50 [ 1989.852519][T12578] do_syscall_64+0x4a/0x90 [ 1989.857055][T12578] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1989.863052][T12578] RIP: 0033:0x4665f9 [ 1989.867087][T12578] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1989.887562][T12577] tc_dump_action: action bad kind [ 1989.889564][T12578] RSP: 002b:00007fad613a1188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1989.902981][T12578] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1989.911161][T12578] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 1989.920350][T12578] RBP: 00007fad613a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1989.928393][T12578] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1989.936356][T12578] R13: 00007ffeecdc550f R14: 00007fad613a1300 R15: 0000000000022000 [ 1989.944831][T12560] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1989.958177][T12560] EXT4-fs (loop4): get root inode failed [ 1989.964186][T12560] EXT4-fs (loop4): mount failed 09:28:37 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c1ec, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:28:37 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000000500fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x8}}, [], {0x14}}, 0x28}}, 0x0) 09:28:37 executing program 0 (fault-call:1 fault-nth:5): r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:37 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06003d2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:28:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000013000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 1990.298804][T12599] tc_dump_action: action bad kind [ 1990.304975][T12601] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5 sclass=netlink_route_socket pid=12601 comm=syz-executor.3 [ 1990.323175][T12602] loop4: detected capacity change from 0 to 545 [ 1990.326399][T12606] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 09:28:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x9}}, [], {0x14}}, 0x28}}, 0x0) [ 1990.339222][T12602] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1990.351233][T12602] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1990.360999][T12602] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1990.376945][T12602] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1990.382137][T12612] tc_dump_action: action bad kind 09:28:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0xa}}, [], {0x14}}, 0x28}}, 0x0) 09:28:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06003e2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 1990.390732][T12602] EXT4-fs (loop4): get root inode failed [ 1990.402585][T12602] EXT4-fs (loop4): mount failed [ 1990.421857][T12606] FAULT_INJECTION: forcing a failure. [ 1990.421857][T12606] name failslab, interval 1, probability 0, space 0, times 0 [ 1990.435817][T12606] CPU: 1 PID: 12606 Comm: syz-executor.0 Not tainted 5.12.0-syzkaller #0 [ 1990.444495][T12606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1990.454844][T12606] Call Trace: [ 1990.458125][T12606] dump_stack+0x137/0x19d [ 1990.462472][T12606] should_fail+0x23c/0x250 [ 1990.466972][T12606] __should_failslab+0x81/0x90 [ 1990.471744][T12606] should_failslab+0x5/0x20 [ 1990.476257][T12606] kmem_cache_alloc_node+0x58/0x2b0 [ 1990.481452][T12606] ? __alloc_skb+0xed/0x420 [ 1990.485966][T12606] __alloc_skb+0xed/0x420 [ 1990.490341][T12606] netlink_ack+0x292/0x690 [ 1990.494764][T12606] netlink_rcv_skb+0x1b7/0x240 [ 1990.499537][T12606] ? rtnetlink_bind+0x60/0x60 [ 1990.504368][T12606] rtnetlink_rcv+0x18/0x20 [ 1990.508803][T12606] netlink_unicast+0x5ec/0x6b0 [ 1990.513585][T12606] netlink_sendmsg+0x6f8/0x7c0 [ 1990.518366][T12606] ? netlink_getsockopt+0x720/0x720 [ 1990.523614][T12606] ____sys_sendmsg+0x360/0x4d0 [ 1990.528442][T12606] ? import_iovec+0x69/0x80 [ 1990.532948][T12606] __sys_sendmsg+0x1ed/0x270 [ 1990.537536][T12606] ? __fsnotify_parent+0x32f/0x430 [ 1990.542652][T12606] ? get_pid_task+0x8b/0xc0 09:28:38 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000000600fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 1990.547160][T12606] ? vfs_write+0x50c/0x770 [ 1990.551650][T12606] ? __fget_light+0x21b/0x260 [ 1990.556863][T12606] ? perf_trace_sys_enter+0x4d/0x2c0 [ 1990.562194][T12606] ? fput+0x2d/0x130 [ 1990.566081][T12606] ? syscall_trace_enter+0x153/0x290 [ 1990.571378][T12606] __x64_sys_sendmsg+0x42/0x50 [ 1990.576273][T12606] do_syscall_64+0x4a/0x90 [ 1990.580802][T12606] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1990.587356][T12606] RIP: 0033:0x4665f9 [ 1990.591313][T12606] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1990.610951][T12606] RSP: 002b:00007fad613a1188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1990.619365][T12606] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1990.627324][T12606] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 1990.635301][T12606] RBP: 00007fad613a11d0 R08: 0000000000000000 R09: 0000000000000000 09:28:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0xb}}, [], {0x14}}, 0x28}}, 0x0) 09:28:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000025000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 1990.643362][T12606] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1990.651411][T12606] R13: 00007ffeecdc550f R14: 00007fad613a1300 R15: 0000000000022000 [ 1990.708505][T12626] tc_dump_action: action bad kind [ 1990.714229][T12620] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=6 sclass=netlink_route_socket pid=12620 comm=syz-executor.3 [ 1990.754479][T12629] loop4: detected capacity change from 0 to 545 [ 1990.765113][T12629] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1990.774967][T12629] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1990.784799][T12629] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1990.796050][T12629] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1990.808197][T12629] EXT4-fs (loop4): get root inode failed [ 1990.813841][T12629] EXT4-fs (loop4): mount failed 09:28:38 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c1ed, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:28:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06003f2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:28:38 executing program 0 (fault-call:1 fault-nth:6): r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0xc}}, [], {0x14}}, 0x28}}, 0x0) 09:28:38 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000000700fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000002f000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:28:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0xd}}, [], {0x14}}, 0x28}}, 0x0) [ 1991.252609][T12652] tc_dump_action: action bad kind [ 1991.254317][T12655] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=7 sclass=netlink_route_socket pid=12655 comm=syz-executor.3 [ 1991.261953][T12656] loop4: detected capacity change from 0 to 545 [ 1991.278639][T12654] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 09:28:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600402d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 1991.298127][T12656] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1991.307951][T12656] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1991.317786][T12656] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1991.335293][T12654] FAULT_INJECTION: forcing a failure. [ 1991.335293][T12654] name failslab, interval 1, probability 0, space 0, times 0 [ 1991.347967][T12654] CPU: 1 PID: 12654 Comm: syz-executor.0 Not tainted 5.12.0-syzkaller #0 [ 1991.356392][T12654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1991.367404][T12654] Call Trace: [ 1991.370675][T12654] dump_stack+0x137/0x19d [ 1991.375000][T12654] should_fail+0x23c/0x250 [ 1991.379422][T12654] __should_failslab+0x81/0x90 [ 1991.384189][T12654] should_failslab+0x5/0x20 [ 1991.388711][T12654] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 1991.394445][T12654] ? __kmalloc_node_track_caller+0x30/0x40 [ 1991.400316][T12654] ? kmem_cache_alloc_node+0x1da/0x2b0 [ 1991.405810][T12654] __kmalloc_node_track_caller+0x30/0x40 [ 1991.411434][T12654] ? netlink_ack+0x292/0x690 [ 1991.416013][T12654] __alloc_skb+0x187/0x420 [ 1991.420432][T12654] netlink_ack+0x292/0x690 [ 1991.424843][T12654] netlink_rcv_skb+0x1b7/0x240 [ 1991.429679][T12654] ? rtnetlink_bind+0x60/0x60 [ 1991.434361][T12654] rtnetlink_rcv+0x18/0x20 [ 1991.438815][T12654] netlink_unicast+0x5ec/0x6b0 [ 1991.444017][T12654] netlink_sendmsg+0x6f8/0x7c0 [ 1991.446056][T12662] tc_dump_action: action bad kind [ 1991.448786][T12654] ? netlink_getsockopt+0x720/0x720 [ 1991.448819][T12654] ____sys_sendmsg+0x360/0x4d0 [ 1991.463779][T12654] ? import_iovec+0x69/0x80 [ 1991.468289][T12654] __sys_sendmsg+0x1ed/0x270 [ 1991.472884][T12654] ? __fsnotify_parent+0x32f/0x430 [ 1991.478054][T12654] ? get_pid_task+0x8b/0xc0 [ 1991.482554][T12654] ? vfs_write+0x50c/0x770 [ 1991.486979][T12654] ? __fget_light+0x21b/0x260 [ 1991.491661][T12654] ? perf_trace_sys_enter+0x4d/0x2c0 [ 1991.496955][T12654] ? fput+0x2d/0x130 09:28:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0xe}}, [], {0x14}}, 0x28}}, 0x0) [ 1991.500845][T12654] ? syscall_trace_enter+0x153/0x290 [ 1991.506132][T12654] __x64_sys_sendmsg+0x42/0x50 [ 1991.510888][T12654] do_syscall_64+0x4a/0x90 [ 1991.515370][T12654] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1991.521316][T12654] RIP: 0033:0x4665f9 [ 1991.525249][T12654] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1991.544905][T12654] RSP: 002b:00007fad613a1188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1991.553317][T12654] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1991.561487][T12654] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 1991.569462][T12654] RBP: 00007fad613a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1991.577429][T12654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1991.585396][T12654] R13: 00007ffeecdc550f R14: 00007fad613a1300 R15: 0000000000022000 09:28:39 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000000900fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x10}}, [], {0x14}}, 0x28}}, 0x0) [ 1991.595337][T12656] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1991.607509][T12656] EXT4-fs (loop4): get root inode failed [ 1991.613140][T12656] EXT4-fs (loop4): mount failed 09:28:39 executing program 0 (fault-call:1 fault-nth:7): r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 1991.641943][T12669] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=9 sclass=netlink_route_socket pid=12669 comm=syz-executor.3 [ 1991.679354][T12674] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1991.688662][T12672] tc_dump_action: action bad kind [ 1991.688728][T12674] FAULT_INJECTION: forcing a failure. [ 1991.688728][T12674] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1991.706774][T12674] CPU: 1 PID: 12674 Comm: syz-executor.0 Not tainted 5.12.0-syzkaller #0 [ 1991.715187][T12674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1991.725254][T12674] Call Trace: [ 1991.728533][T12674] dump_stack+0x137/0x19d [ 1991.732879][T12674] should_fail+0x23c/0x250 [ 1991.737369][T12674] should_fail_usercopy+0x16/0x20 [ 1991.742433][T12674] _copy_to_user+0x1c/0x90 [ 1991.746837][T12674] simple_read_from_buffer+0xab/0x120 [ 1991.752198][T12674] proc_fail_nth_read+0xf6/0x140 [ 1991.757127][T12674] ? rw_verify_area+0x136/0x250 [ 1991.762011][T12674] ? proc_fault_inject_write+0x200/0x200 [ 1991.767633][T12674] vfs_read+0x154/0x5d0 [ 1991.771818][T12674] ? __fget_light+0x21b/0x260 [ 1991.776650][T12674] ? __cond_resched+0x11/0x40 [ 1991.781394][T12674] ksys_read+0xce/0x180 [ 1991.785616][T12674] __x64_sys_read+0x3e/0x50 [ 1991.790128][T12674] do_syscall_64+0x4a/0x90 [ 1991.794561][T12674] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1991.800631][T12674] RIP: 0033:0x41937c [ 1991.804513][T12674] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1991.824220][T12674] RSP: 002b:00007fad613a1170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1991.832622][T12674] RAX: ffffffffffffffda RBX: 000000000000004c RCX: 000000000041937c [ 1991.840597][T12674] RDX: 000000000000000f RSI: 00007fad613a11e0 RDI: 0000000000000004 [ 1991.848560][T12674] RBP: 00007fad613a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1991.856534][T12674] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1991.864624][T12674] R13: 00007ffeecdc550f R14: 00007fad613a1300 R15: 0000000000022000 09:28:39 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c1ee, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:28:39 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000000a00fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600412d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:28:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x11}}, [], {0x14}}, 0x28}}, 0x0) 09:28:39 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000030000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 1992.151010][T12688] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=10 sclass=netlink_route_socket pid=12688 comm=syz-executor.3 [ 1992.165044][T12689] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1992.176124][T12695] tc_dump_action: action bad kind [ 1992.181533][T12693] loop4: detected capacity change from 0 to 545 [ 1992.191699][T12693] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 09:28:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600422d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:28:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x12}}, [], {0x14}}, 0x28}}, 0x0) 09:28:39 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 1992.201570][T12693] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1992.211443][T12693] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1992.230883][T12693] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1992.244146][T12693] EXT4-fs (loop4): get root inode failed 09:28:39 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000000b00fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 1992.249829][T12693] EXT4-fs (loop4): mount failed 09:28:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600432d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:28:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x14}}, [], {0x14}}, 0x28}}, 0x0) [ 1992.279102][T12706] tc_dump_action: action bad kind [ 1992.288127][T12708] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1992.304866][T12709] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=11 sclass=netlink_route_socket pid=12709 comm=syz-executor.3 [ 1992.390388][T12720] tc_dump_action: action bad kind 09:28:40 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c1ef, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:28:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000031000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:28:40 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600442d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:28:40 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000000c00fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x25}}, [], {0x14}}, 0x28}}, 0x0) [ 1993.078501][T12724] tc_dump_action: action bad kind [ 1993.099249][T12729] validate_nla: 33 callbacks suppressed [ 1993.099265][T12729] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 1993.113807][T12729] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 09:28:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x48}}, [], {0x14}}, 0x28}}, 0x0) [ 1993.127869][T12732] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 1993.136438][T12735] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12 sclass=netlink_route_socket pid=12735 comm=syz-executor.3 [ 1993.153207][T12734] loop4: detected capacity change from 0 to 545 [ 1993.160943][T12732] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:28:40 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000000d00fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x4c}}, [], {0x14}}, 0x28}}, 0x0) [ 1993.165262][T12734] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1993.180237][T12734] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1993.188738][T12740] tc_dump_action: action bad kind [ 1993.190030][T12734] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1993.203060][T12732] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:28:40 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x3, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600452d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 1993.222264][T12734] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1993.234719][T12734] EXT4-fs (loop4): get root inode failed [ 1993.240494][T12734] EXT4-fs (loop4): mount failed [ 1993.267873][T12746] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 1993.277358][T12746] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1993.293810][T12748] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=13 sclass=netlink_route_socket pid=12748 comm=syz-executor.3 [ 1993.307676][T12750] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 1993.316226][T12749] tc_dump_action: action bad kind 09:28:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x60}}, [], {0x14}}, 0x28}}, 0x0) [ 1993.328816][T12750] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 1993.364876][T12756] tc_dump_action: action bad kind [ 1993.371627][T12750] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:28:41 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c1f0, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:28:41 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000000e00fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000044000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:28:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x68}}, [], {0x14}}, 0x28}}, 0x0) 09:28:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600462d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:28:41 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:41 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000021000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 1994.053817][T12770] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=14 sclass=netlink_route_socket pid=12770 comm=syz-executor.3 [ 1994.064391][T12774] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 1994.067234][T12769] loop4: detected capacity change from 0 to 545 [ 1994.079788][T12774] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 1994.090536][T12773] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 09:28:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x6c}}, [], {0x14}}, 0x28}}, 0x0) 09:28:41 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:41 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000031000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 1994.100810][T12775] tc_dump_action: action bad kind [ 1994.110420][T12769] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1994.120367][T12769] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1994.130334][T12769] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 09:28:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600472d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 1994.168546][T12783] tc_dump_action: action bad kind 09:28:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x74}}, [], {0x14}}, 0x28}}, 0x0) [ 1994.199040][T12787] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1994.220423][T12769] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1994.232535][T12769] EXT4-fs (loop4): get root inode failed [ 1994.238258][T12769] EXT4-fs (loop4): mount failed [ 1994.247100][T12792] tc_dump_action: action bad kind 09:28:42 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c1f1, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:28:42 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000041000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600482d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:28:42 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x6, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x7a}}, [], {0x14}}, 0x28}}, 0x0) 09:28:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000fe000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:28:42 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x7, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:42 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000051000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 1994.988682][T12810] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1994.997997][T12808] tc_dump_action: action bad kind [ 1995.007722][T12812] loop4: detected capacity change from 0 to 545 09:28:42 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000061000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}}, 0x0) 09:28:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600492d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 1995.042899][T12812] EXT4-fs (loop4): bad geometry: block count 254 exceeds size of device (68 blocks) 09:28:42 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x8, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 1995.120358][T12825] tc_dump_action: action bad kind 09:28:43 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c1f2, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:28:43 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000071000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000feff0000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:28:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x0, 0x2}}, [], {0x14}}, 0x28}}, 0x0) 09:28:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06004a2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:28:43 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x9, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06004b2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:28:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x0, 0x3}}, [], {0x14}}, 0x28}}, 0x0) 09:28:43 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000081000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:43 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0xa, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 1995.918609][T12847] tc_dump_action: action bad kind [ 1995.934834][T12852] __nla_validate_parse: 2 callbacks suppressed [ 1995.934850][T12852] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1995.950997][T12849] loop4: detected capacity change from 0 to 545 09:28:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06004c2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:28:43 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000091000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 1995.997694][T12849] EXT4-fs (loop4): bad geometry: block count 65534 exceeds size of device (68 blocks) [ 1996.016258][T12862] tc_dump_action: action bad kind [ 1996.029683][T12865] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 09:28:44 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c1f3, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:28:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x0, 0x4}}, [], {0x14}}, 0x28}}, 0x0) 09:28:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000000002000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:28:44 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0xb, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06004d2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:28:44 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c00000a1000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x0, 0x5}}, [], {0x14}}, 0x28}}, 0x0) 09:28:44 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c00000b1000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 1996.875909][T12888] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1996.877496][T12884] loop4: detected capacity change from 0 to 545 [ 1996.892552][T12889] tc_dump_action: action bad kind 09:28:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06004e2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 1996.926787][T12884] EXT4-fs (loop4): bad geometry: block count 2097152 exceeds size of device (68 blocks) 09:28:44 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:44 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c00000c1000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 1996.971501][T12898] tc_dump_action: action bad kind 09:28:44 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c00000d1000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 1997.010497][T12901] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 09:28:45 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c1f4, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:28:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x0, 0x6}}, [], {0x14}}, 0x28}}, 0x0) 09:28:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06004f2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:28:45 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0xd, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000feffffff030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:28:45 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c00000e1000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600502d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:28:45 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000101000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x0, 0x7}}, [], {0x14}}, 0x28}}, 0x0) [ 1997.773652][T12920] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1997.784191][T12922] tc_dump_action: action bad kind [ 1997.799462][T12928] loop4: detected capacity change from 0 to 545 09:28:45 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 1997.819028][T12928] EXT4-fs (loop4): bad geometry: block count 4294967294 exceeds size of device (68 blocks) 09:28:45 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000111000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600512d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 1997.850474][T12938] tc_dump_action: action bad kind [ 1997.872629][T12940] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 09:28:46 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c1f5, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:28:46 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x10, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000080000000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:28:46 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000121000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x0, 0x8}}, [], {0x14}}, 0x28}}, 0x0) 09:28:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600522d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:28:46 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000251000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 1998.699203][T12961] validate_nla: 45 callbacks suppressed [ 1998.699218][T12961] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 1998.713669][T12962] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 1998.721908][T12962] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1998.731227][T12963] tc_dump_action: action bad kind [ 1998.736241][T12961] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:28:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x0, 0x9}}, [], {0x14}}, 0x28}}, 0x0) 09:28:46 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x11, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 1998.752352][T12966] loop4: detected capacity change from 0 to 545 [ 1998.769309][T12966] EXT4-fs (loop4): bad geometry: block count 2147483712 exceeds size of device (68 blocks) [ 1998.777346][T12961] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:28:46 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000481000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x0, 0xa}}, [], {0x14}}, 0x28}}, 0x0) 09:28:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600532d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 1998.806734][T12973] tc_dump_action: action bad kind [ 1998.821250][T12976] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 1998.829522][T12976] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1998.864288][T12985] tc_dump_action: action bad kind [ 1998.871892][T12986] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 1998.900616][T12986] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 1998.918257][T12986] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:28:47 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c1f6, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:28:47 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c00004c1000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000000010000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:28:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x0, 0xb}}, [], {0x14}}, 0x28}}, 0x0) 09:28:47 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x12, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600542d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:28:47 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000601000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 1999.628277][T12999] tc_dump_action: action bad kind [ 1999.638692][T13003] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 1999.646934][T13003] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1999.657536][T13004] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 1999.662148][T13001] loop4: detected capacity change from 0 to 545 09:28:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x0, 0xc}}, [], {0x14}}, 0x28}}, 0x0) 09:28:47 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x25, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600552d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 1999.681403][T13001] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1999.691196][T13001] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1999.701036][T13001] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 09:28:47 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000681000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x0, 0xd}}, [], {0x14}}, 0x28}}, 0x0) [ 1999.746176][T13013] tc_dump_action: action bad kind [ 1999.762615][T13014] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1999.803106][T13001] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1999.815192][T13001] EXT4-fs (loop4): get root inode failed [ 1999.820858][T13001] EXT4-fs (loop4): mount failed [ 1999.843495][T13022] tc_dump_action: action bad kind 09:28:48 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c1f7, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:28:48 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c00006c1000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600562d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:28:48 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x48, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x0, 0xe}}, [], {0x14}}, 0x28}}, 0x0) 09:28:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000000020000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:28:48 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x4c, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:48 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000741000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600572d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2000.558641][T13038] loop4: detected capacity change from 0 to 545 [ 2000.564239][T13042] tc_dump_action: action bad kind [ 2000.573431][T13038] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2000.583355][T13038] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2000.593181][T13038] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 09:28:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x0, 0x10}}, [], {0x14}}, 0x28}}, 0x0) 09:28:48 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x60, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:48 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c00007a1000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2000.632957][T13038] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2000.645035][T13038] EXT4-fs (loop4): get root inode failed [ 2000.650707][T13038] EXT4-fs (loop4): mount failed [ 2000.681842][T13058] tc_dump_action: action bad kind 09:28:49 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c1f8, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:28:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600582d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:28:49 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x0, 0x11}}, [], {0x14}}, 0x28}}, 0x0) 09:28:49 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x68, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040020000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:28:49 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001200fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x0, 0x12}}, [], {0x14}}, 0x28}}, 0x0) [ 2001.491591][T13078] __nla_validate_parse: 4 callbacks suppressed [ 2001.491605][T13078] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2001.507273][T13081] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2001.516604][T13079] tc_dump_action: action bad kind [ 2001.530069][T13083] loop4: detected capacity change from 0 to 545 09:28:49 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x6c, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600592d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2001.547416][T13083] EXT4-fs (loop4): bad geometry: block count 576 exceeds size of device (68 blocks) [ 2001.553886][T13090] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2001.578226][T13090] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 09:28:49 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x74, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:49 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000002900fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2001.597092][T13094] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2001.606488][T13093] tc_dump_action: action bad kind [ 2001.652839][T13099] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2001.662312][T13103] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 09:28:50 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c1f9, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:28:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06005a2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:28:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x0, 0x14}}, [], {0x14}}, 0x28}}, 0x0) 09:28:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040030000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:28:50 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x7a, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:50 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000007700fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06005b2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:28:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x0, 0x25}}, [], {0x14}}, 0x28}}, 0x0) [ 2002.417378][T13116] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=119 sclass=netlink_route_socket pid=13116 comm=syz-executor.3 [ 2002.432872][T13119] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2002.444031][T13120] tc_dump_action: action bad kind [ 2002.460725][T13122] loop4: detected capacity change from 0 to 545 09:28:50 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000000200fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:50 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x300, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2002.477072][T13122] EXT4-fs (loop4): bad geometry: block count 832 exceeds size of device (68 blocks) 09:28:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06005c2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:28:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x0, 0x48}}, [], {0x14}}, 0x28}}, 0x0) [ 2002.529367][T13133] tc_dump_action: action bad kind [ 2002.535895][T13131] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2 sclass=netlink_route_socket pid=13131 comm=syz-executor.3 [ 2002.557608][T13134] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2002.630920][T13143] tc_dump_action: action bad kind 09:28:50 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c1fa, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:28:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040040000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:28:50 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x500, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:50 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000000300fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06005d2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:28:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x0, 0x4c}}, [], {0x14}}, 0x28}}, 0x0) 09:28:51 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x600, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2003.342190][T13155] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2003.355173][T13157] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=13157 comm=syz-executor.3 [ 2003.359169][T13160] tc_dump_action: action bad kind [ 2003.378537][T13156] loop4: detected capacity change from 0 to 545 09:28:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06005e2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:28:51 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000000400fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x0, 0x60}}, [], {0x14}}, 0x28}}, 0x0) 09:28:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06005f2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2003.391324][T13156] EXT4-fs (loop4): bad geometry: block count 1088 exceeds size of device (68 blocks) 09:28:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x0, 0x68}}, [], {0x14}}, 0x28}}, 0x0) [ 2003.449867][T13172] tc_dump_action: action bad kind [ 2003.483707][T13177] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4 sclass=netlink_route_socket pid=13177 comm=syz-executor.3 [ 2003.502445][T13178] tc_dump_action: action bad kind 09:28:51 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c1fb, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:28:51 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x700, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600602d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:28:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040050000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:28:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x0, 0x6c}}, [], {0x14}}, 0x28}}, 0x0) 09:28:51 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000000500fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:51 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000000600fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2004.289777][T13195] validate_nla: 51 callbacks suppressed [ 2004.289792][T13195] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2004.290418][T13197] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5 sclass=netlink_route_socket pid=13197 comm=syz-executor.3 [ 2004.301203][T13195] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2004.324785][T13198] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2004.333265][T13199] tc_dump_action: action bad kind 09:28:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x0, 0x74}}, [], {0x14}}, 0x28}}, 0x0) 09:28:52 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x900, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040060000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2004.340590][T13196] loop4: detected capacity change from 0 to 545 [ 2004.353556][T13196] EXT4-fs (loop4): bad geometry: block count 1344 exceeds size of device (68 blocks) [ 2004.367072][T13204] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=6 sclass=netlink_route_socket pid=13204 comm=syz-executor.3 09:28:52 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000000700fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x0, 0x7a}}, [], {0x14}}, 0x28}}, 0x0) [ 2004.407878][T13208] tc_dump_action: action bad kind [ 2004.413886][T13195] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2004.439651][T13213] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2004.477749][T13214] loop4: detected capacity change from 0 to 545 [ 2004.487426][T13214] EXT4-fs (loop4): bad geometry: block count 1600 exceeds size of device (68 blocks) [ 2004.498691][T13220] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=7 sclass=netlink_route_socket pid=13220 comm=syz-executor.3 [ 2004.517189][T13222] tc_dump_action: action bad kind 09:28:52 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c1fc, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:28:52 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0xa00, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600612d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:28:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x0, 0x0, 0x25}}, [], {0x14}}, 0x28}}, 0x0) 09:28:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040070000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:28:52 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000000800fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:52 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000000900fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2005.216975][T13236] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2005.225575][T13235] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=13235 comm=syz-executor.3 [ 2005.225615][T13237] tc_dump_action: action bad kind [ 2005.245035][T13239] loop4: detected capacity change from 0 to 545 [ 2005.256258][T13239] EXT4-fs (loop4): bad geometry: block count 1856 exceeds size of device (68 blocks) [ 2005.260464][T13236] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2005.274870][T13240] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2005.289351][T13236] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:28:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x0, 0x0, 0x74c}}, [], {0x14}}, 0x28}}, 0x0) 09:28:53 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0xb00, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600622d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2005.309448][T13246] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=9 sclass=netlink_route_socket pid=13246 comm=syz-executor.3 09:28:53 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000000a00fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040080000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2005.374521][T13254] tc_dump_action: action bad kind [ 2005.383814][T13256] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2005.423359][T13262] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=10 sclass=netlink_route_socket pid=13262 comm=syz-executor.3 [ 2005.447251][T13263] loop4: detected capacity change from 0 to 545 [ 2005.461327][T13263] EXT4-fs (loop4): bad geometry: block count 2112 exceeds size of device (68 blocks) 09:28:53 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c1fd, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:28:53 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0xc00, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9, 0x0, 0x0, {0x0, 0x0, 0x1b3f}}, [], {0x14}}, 0x28}}, 0x0) 09:28:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600632d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:28:53 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000000b00fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040090000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:28:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x10}}, 0x28}}, 0x0) [ 2006.140086][T13282] tc_dump_action: action bad kind [ 2006.156688][T13284] loop4: detected capacity change from 0 to 545 09:28:53 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0xd00, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:53 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000000c00fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600642d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2006.180855][T13284] EXT4-fs (loop4): bad geometry: block count 2368 exceeds size of device (68 blocks) 09:28:53 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000000d00fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000400a0000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2006.227397][T13295] tc_dump_action: action bad kind [ 2006.300371][T13307] loop4: detected capacity change from 0 to 545 [ 2006.316562][T13307] EXT4-fs (loop4): bad geometry: block count 2624 exceeds size of device (68 blocks) 09:28:54 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c1fe, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:28:54 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0xe00, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x28}}, 0x28}}, 0x0) 09:28:54 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000000e00fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600652d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:28:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000400b0000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:28:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x32}}, 0x28}}, 0x0) 09:28:54 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2007.062032][T13328] tc_dump_action: action bad kind [ 2007.067671][T13329] __nla_validate_parse: 7 callbacks suppressed [ 2007.067687][T13329] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2007.098572][T13332] loop4: detected capacity change from 0 to 545 09:28:54 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x1100, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600662d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2007.138828][T13332] EXT4-fs (loop4): bad geometry: block count 2880 exceeds size of device (68 blocks) [ 2007.153995][T13341] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2007.173503][T13342] tc_dump_action: action bad kind [ 2007.188090][T13342] tc_dump_action: action bad kind 09:28:54 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001200fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0xec0}}, 0x28}}, 0x0) [ 2007.223909][T13346] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2007.293012][T13355] tc_dump_action: action bad kind [ 2007.298491][T13359] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2007.307828][T13359] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 09:28:55 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c1ff, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:28:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600672d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:28:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000400c0000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:28:55 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x1200, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x10}}, 0x28}}, 0x0) 09:28:55 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000002900fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:55 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000007700fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2008.008113][T13366] loop4: detected capacity change from 0 to 545 [ 2008.017805][T13370] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2008.032737][T13374] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2008.052054][T13375] tc_dump_action: action bad kind 09:28:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600682d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:28:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x32}}, 0x28}}, 0x0) 09:28:55 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2008.066524][T13366] EXT4-fs (loop4): bad geometry: block count 3136 exceeds size of device (68 blocks) [ 2008.085841][T13380] selinux_netlink_send: 4 callbacks suppressed [ 2008.085856][T13380] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=119 sclass=netlink_route_socket pid=13380 comm=syz-executor.3 09:28:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600692d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:28:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x77}}, 0x28}}, 0x0) [ 2008.158876][T13385] tc_dump_action: action bad kind [ 2008.208688][T13393] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=119 sclass=netlink_route_socket pid=13393 comm=syz-executor.1 [ 2008.222755][T13393] tc_dump_action: action bad kind [ 2008.227924][T13395] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 09:28:56 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c200, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:28:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000400d0000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:28:56 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001002fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:56 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x2500, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06006a2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:28:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x2}}, 0x28}}, 0x0) 09:28:56 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x4800, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x8}}, 0x28}}, 0x0) 09:28:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06006b2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2008.943527][T13406] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2008.951511][T13409] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=528 sclass=netlink_route_socket pid=13409 comm=syz-executor.3 [ 2008.967010][T13410] tc_dump_action: action bad kind [ 2008.967033][T13408] loop4: detected capacity change from 0 to 545 09:28:56 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001003fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x25}}, 0x28}}, 0x0) 09:28:56 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x4c00, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2009.037250][T13408] EXT4-fs (loop4): bad geometry: block count 3392 exceeds size of device (68 blocks) [ 2009.050213][T13416] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2009.060601][T13420] tc_dump_action: action bad kind [ 2009.141943][T13425] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=784 sclass=netlink_route_socket pid=13425 comm=syz-executor.3 [ 2009.163601][T13431] tc_dump_action: action bad kind 09:28:57 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c201, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:28:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06006c2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:28:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000400e0000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:28:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x300}}, 0x28}}, 0x0) 09:28:57 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001004fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:57 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x4c97, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}}, 0x0) [ 2009.892117][T13448] validate_nla: 43 callbacks suppressed [ 2009.892131][T13448] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2009.896564][T13447] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1040 sclass=netlink_route_socket pid=13447 comm=syz-executor.3 [ 2009.898952][T13446] loop4: detected capacity change from 0 to 545 [ 2009.905972][T13444] tc_dump_action: action bad kind [ 2009.915384][T13450] netlink: 'syz-executor.0': attribute type 27 has an invalid length. 09:28:57 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001005fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06006d2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2009.925408][T13446] EXT4-fs (loop4): bad geometry: block count 3648 exceeds size of device (68 blocks) [ 2009.958661][T13448] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2009.975122][T13455] tc_dump_action: action bad kind 09:28:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000400f0000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:28:57 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x6000, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x2}}, 0x28}}, 0x0) [ 2010.048472][T13462] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1296 sclass=netlink_route_socket pid=13462 comm=syz-executor.3 [ 2010.085006][T13469] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2010.093378][T13468] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2010.094305][T13470] loop4: detected capacity change from 0 to 545 [ 2010.104300][T13471] tc_dump_action: action bad kind [ 2010.123931][T13468] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2010.126503][T13470] EXT4-fs (loop4): bad geometry: block count 3904 exceeds size of device (68 blocks) [ 2010.164294][T13468] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:28:58 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c202, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:28:58 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x6800, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:58 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001006fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x3}}, 0x28}}, 0x0) 09:28:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040100000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:28:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06006e2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:28:58 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001007fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2010.803996][T13485] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2010.819452][T13491] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1552 sclass=netlink_route_socket pid=13491 comm=syz-executor.3 [ 2010.836760][T13493] tc_dump_action: action bad kind [ 2010.841940][T13492] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:28:58 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x6c00, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x4}}, 0x28}}, 0x0) [ 2010.844494][T13490] loop4: detected capacity change from 0 to 545 [ 2010.871034][T13492] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:28:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x5}}, 0x28}}, 0x0) [ 2010.896255][T13501] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1808 sclass=netlink_route_socket pid=13501 comm=syz-executor.3 [ 2010.906052][T13502] tc_dump_action: action bad kind 09:28:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06006f2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:28:58 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x7400, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2010.946475][T13490] EXT4-fs (loop4): bad geometry: block count 4160 exceeds size of device (68 blocks) [ 2010.997354][T13508] tc_dump_action: action bad kind 09:28:59 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c203, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:28:59 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001008fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x6}}, 0x28}}, 0x0) 09:28:59 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x7a00, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:28:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600702d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:28:59 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040110000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:28:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x7}}, 0x28}}, 0x0) 09:28:59 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x974c, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2011.815626][T13529] loop4: detected capacity change from 0 to 545 [ 2011.821090][T13535] tc_dump_action: action bad kind [ 2011.841260][T13533] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2064 sclass=netlink_route_socket pid=13533 comm=syz-executor.3 [ 2011.854648][T13529] EXT4-fs (loop4): bad geometry: block count 4416 exceeds size of device (68 blocks) 09:28:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x8}}, 0x28}}, 0x0) 09:28:59 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040120000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2011.877603][T13540] tc_dump_action: action bad kind 09:28:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600712d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:28:59 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x34000, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2011.958707][T13551] tc_dump_action: action bad kind [ 2011.983458][T13552] loop4: detected capacity change from 0 to 545 [ 2011.996729][T13552] EXT4-fs (loop4): bad geometry: block count 4672 exceeds size of device (68 blocks) 09:29:00 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c204, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:00 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001009fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x9}}, 0x28}}, 0x0) 09:29:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600722d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:00 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x400300, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040220000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600732d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2012.751537][T13574] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2320 sclass=netlink_route_socket pid=13574 comm=syz-executor.3 [ 2012.755246][T13576] loop4: detected capacity change from 0 to 545 [ 2012.765235][T13577] tc_dump_action: action bad kind [ 2012.778225][T13576] EXT4-fs (loop4): bad geometry: block count 8768 exceeds size of device (68 blocks) [ 2012.786016][T13579] __nla_validate_parse: 9 callbacks suppressed 09:29:00 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c000000100afff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0xa}}, 0x28}}, 0x0) 09:29:00 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x1000000, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2012.786031][T13579] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 09:29:00 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c000000100bfff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600742d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2012.883725][T13591] tc_dump_action: action bad kind [ 2012.891286][T13594] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 09:29:01 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c205, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040250000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0xb}}, 0x28}}, 0x0) 09:29:01 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x2000000, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:01 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c000000100cfff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600752d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600762d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0xc}}, 0x28}}, 0x0) 09:29:01 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x3000000, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2013.685844][T13612] selinux_netlink_send: 3 callbacks suppressed [ 2013.685907][T13612] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3088 sclass=netlink_route_socket pid=13612 comm=syz-executor.3 [ 2013.706616][T13614] tc_dump_action: action bad kind [ 2013.712391][T13615] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2013.727505][T13613] loop4: detected capacity change from 0 to 545 [ 2013.754396][T13613] EXT4-fs (loop4): bad geometry: block count 9536 exceeds size of device (68 blocks) [ 2013.790341][T13623] tc_dump_action: action bad kind 09:29:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0xd}}, 0x28}}, 0x0) 09:29:01 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c000000100dfff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600772d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2013.802330][T13625] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2013.845279][T13628] tc_dump_action: action bad kind [ 2013.851647][T13630] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3344 sclass=netlink_route_socket pid=13630 comm=syz-executor.3 09:29:02 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c206, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600782d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000402e0000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:02 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x4000000, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:02 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c000000100efff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0xe}}, 0x28}}, 0x0) 09:29:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600792d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2014.611210][T13649] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3600 sclass=netlink_route_socket pid=13649 comm=syz-executor.3 [ 2014.617692][T13648] loop4: detected capacity change from 0 to 545 [ 2014.636653][T13648] EXT4-fs (loop4): bad geometry: block count 11840 exceeds size of device (68 blocks) [ 2014.645249][T13654] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2014.656627][T13655] tc_dump_action: action bad kind 09:29:02 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001010fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x10}}, 0x28}}, 0x0) 09:29:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040440000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:02 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x5000000, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06007a2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2014.740160][T13667] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4112 sclass=netlink_route_socket pid=13667 comm=syz-executor.3 [ 2014.754443][T13670] tc_dump_action: action bad kind [ 2014.774558][T13671] loop4: detected capacity change from 0 to 545 [ 2014.780153][T13672] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2014.791137][T13671] EXT4-fs (loop4): bad geometry: block count 17472 exceeds size of device (68 blocks) 09:29:03 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c207, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x11}}, 0x28}}, 0x0) 09:29:03 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001011fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:03 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x6000000, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06007b2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040480000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2015.557240][T13693] loop4: detected capacity change from 0 to 545 [ 2015.564093][T13694] validate_nla: 48 callbacks suppressed [ 2015.564105][T13694] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2015.578267][T13694] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2015.587208][T13696] tc_dump_action: action bad kind [ 2015.593085][T13694] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:29:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06007c2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x12}}, 0x28}}, 0x0) [ 2015.596459][T13698] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4368 sclass=netlink_route_socket pid=13698 comm=syz-executor.3 [ 2015.619725][T13693] EXT4-fs (loop4): bad geometry: block count 18496 exceeds size of device (68 blocks) [ 2015.638853][T13697] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2015.647086][T13697] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 09:29:03 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x7000000, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2015.662370][T13706] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2015.670603][T13705] tc_dump_action: action bad kind [ 2015.677015][T13706] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:29:03 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001012fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x14}}, 0x28}}, 0x0) 09:29:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000404c0000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2015.712885][T13706] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2015.765722][T13715] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2015.773924][T13715] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2015.775398][T13719] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4624 sclass=netlink_route_socket pid=13719 comm=syz-executor.3 [ 2015.797285][T13718] tc_dump_action: action bad kind [ 2015.825727][T13721] loop4: detected capacity change from 0 to 545 [ 2015.834601][T13721] EXT4-fs (loop4): bad geometry: block count 19520 exceeds size of device (68 blocks) 09:29:04 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c208, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x25}}, 0x28}}, 0x0) 09:29:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06007d2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:04 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001025fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:04 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x8000000, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040600000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06007e2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x48}}, 0x28}}, 0x0) [ 2016.509027][T13739] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2016.517277][T13739] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2016.527472][T13740] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=9488 sclass=netlink_route_socket pid=13740 comm=syz-executor.3 [ 2016.542609][T13741] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2016.551383][T13743] tc_dump_action: action bad kind 09:29:04 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001048fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:04 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x9000000, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2016.575420][T13744] loop4: detected capacity change from 0 to 545 [ 2016.590730][T13744] EXT4-fs (loop4): bad geometry: block count 24640 exceeds size of device (68 blocks) 09:29:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x4c}}, 0x28}}, 0x0) 09:29:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040680000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2016.618055][T13755] tc_dump_action: action bad kind [ 2016.645858][T13758] tc_dump_action: action bad kind [ 2016.677803][T13759] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=18448 sclass=netlink_route_socket pid=13759 comm=syz-executor.3 [ 2016.699432][T13763] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2016.716770][T13764] loop4: detected capacity change from 0 to 545 [ 2016.726478][T13764] EXT4-fs (loop4): bad geometry: block count 26688 exceeds size of device (68 blocks) 09:29:05 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c209, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x60}}, 0x28}}, 0x0) 09:29:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06007f2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:05 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0xa000000, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:05 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c000000104cfff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000406c0000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:05 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0xb000000, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:05 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001060fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600802d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2017.492627][T13782] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=19472 sclass=netlink_route_socket pid=13782 comm=syz-executor.3 [ 2017.502767][T13786] tc_dump_action: action bad kind [ 2017.511343][T13788] loop4: detected capacity change from 0 to 545 09:29:05 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001068fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x68}}, 0x28}}, 0x0) 09:29:05 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0xc000000, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2017.575276][T13793] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=24592 sclass=netlink_route_socket pid=13793 comm=syz-executor.3 [ 2017.600729][T13788] EXT4-fs (loop4): bad geometry: block count 27712 exceeds size of device (68 blocks) [ 2017.640589][T13801] tc_dump_action: action bad kind 09:29:06 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c20a, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:06 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0xd000000, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600812d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x6c}}, 0x28}}, 0x0) 09:29:06 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c000000106cfff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040740000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600822d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2018.441408][T13822] loop4: detected capacity change from 0 to 545 [ 2018.462236][T13822] EXT4-fs (loop4): bad geometry: block count 29760 exceeds size of device (68 blocks) [ 2018.476091][T13825] __nla_validate_parse: 3 callbacks suppressed [ 2018.476101][T13825] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 09:29:06 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001074fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600832d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2018.499579][T13829] tc_dump_action: action bad kind 09:29:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x74}}, 0x28}}, 0x0) 09:29:06 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0xe000000, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000407a0000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2018.609579][T13841] tc_dump_action: action bad kind [ 2018.647408][T13846] loop4: detected capacity change from 0 to 545 [ 2018.648650][T13847] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2018.665438][T13846] EXT4-fs (loop4): bad geometry: block count 31296 exceeds size of device (68 blocks) 09:29:06 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c20b, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:06 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c000000107afff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x7a}}, 0x28}}, 0x0) 09:29:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600842d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:06 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x10000000, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040fe0000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2019.369280][T13865] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2019.379016][T13864] loop4: detected capacity change from 0 to 545 [ 2019.407481][T13868] selinux_netlink_send: 3 callbacks suppressed 09:29:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600852d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x300}}, 0x28}}, 0x0) 09:29:07 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x11000000, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2019.407496][T13868] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31248 sclass=netlink_route_socket pid=13868 comm=syz-executor.3 [ 2019.428195][T13872] tc_dump_action: action bad kind [ 2019.439437][T13864] EXT4-fs (loop4): bad geometry: block count 65088 exceeds size of device (68 blocks) 09:29:07 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd950a76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600862d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040100100030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2019.528888][T13878] tc_dump_action: action bad kind [ 2019.536525][T13883] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2019.573665][T13887] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2019.607358][T13891] loop4: detected capacity change from 0 to 545 [ 2019.622605][T13891] EXT4-fs (loop4): bad geometry: block count 69696 exceeds size of device (68 blocks) 09:29:07 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c20c, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x500}}, 0x28}}, 0x0) 09:29:07 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x12000000, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600872d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:07 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd952576c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040040200030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:08 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x20000000, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x600}}, 0x28}}, 0x0) [ 2020.305933][T13909] tc_dump_action: action bad kind [ 2020.311161][T13912] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2020.320926][T13908] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2020.339134][T13910] loop4: detected capacity change from 0 to 545 09:29:08 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f0ac9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600882d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2020.352057][T13910] EXT4-fs (loop4): bad geometry: block count 132160 exceeds size of device (68 blocks) [ 2020.395354][T13920] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 09:29:08 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f25c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:08 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x25000000, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2020.424836][T13925] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2020.437885][T13923] tc_dump_action: action bad kind [ 2020.501514][T13935] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 09:29:08 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c20d, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x700}}, 0x28}}, 0x0) 09:29:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040190200030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600892d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:08 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x48000000, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:08 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b704a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2021.230327][T13950] validate_nla: 52 callbacks suppressed [ 2021.230343][T13950] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2021.245125][T13951] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2021.254183][T13952] tc_dump_action: action bad kind [ 2021.266290][T13951] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:29:08 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x4c000000, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x900}}, 0x28}}, 0x0) [ 2021.278998][T13954] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2021.292609][T13955] loop4: detected capacity change from 0 to 545 [ 2021.308006][T13955] EXT4-fs (loop4): bad geometry: block count 137536 exceeds size of device (68 blocks) [ 2021.313371][T13951] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:29:09 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b72ca6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06008a2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0xa00}}, 0x28}}, 0x0) [ 2021.343385][T13962] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2021.356479][T13963] tc_dump_action: action bad kind 09:29:09 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x60000000, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2021.418643][T13969] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2021.429572][T13973] tc_dump_action: action bad kind [ 2021.455677][T13975] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2021.466313][T13976] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2021.475447][T13975] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:29:09 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c20e, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040210200030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:09 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b7c0a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0xb00}}, 0x28}}, 0x0) 09:29:09 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x68000000, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06008b2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:09 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6028000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2022.175267][T13987] tc_dump_action: action bad kind 09:29:09 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06008c2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0xc00}}, 0x28}}, 0x0) [ 2022.215989][T13994] loop4: detected capacity change from 0 to 545 [ 2022.230954][T13994] EXT4-fs (loop4): bad geometry: block count 139584 exceeds size of device (68 blocks) 09:29:09 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6038000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:09 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x74000000, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2022.271767][T14003] tc_dump_action: action bad kind 09:29:10 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c20f, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06008d2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040270200030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0xd00}}, 0x28}}, 0x0) 09:29:10 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6048000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:10 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x7a000000, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:10 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6058000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06008e2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:10 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x974c0000, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0xe00}}, 0x28}}, 0x0) [ 2023.141951][T14025] loop4: detected capacity change from 0 to 545 [ 2023.157689][T14025] EXT4-fs (loop4): bad geometry: block count 141120 exceeds size of device (68 blocks) [ 2023.167028][T14030] tc_dump_action: action bad kind 09:29:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0xec0}}, 0x28}}, 0x0) 09:29:10 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6068000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2023.218002][T14041] tc_dump_action: action bad kind [ 2023.276169][T14045] tc_dump_action: action bad kind 09:29:11 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c210, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:11 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x9effffff, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06008f2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000300030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x1100}}, 0x28}}, 0x0) 09:29:11 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6078000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x1200}}, 0x28}}, 0x0) 09:29:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600902d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2024.077058][T14064] tc_dump_action: action bad kind 09:29:11 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6088000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2024.106626][T14067] __nla_validate_parse: 17 callbacks suppressed [ 2024.106645][T14067] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2024.131511][T14068] loop4: detected capacity change from 0 to 545 [ 2024.143170][T14069] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 09:29:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x1400}}, 0x28}}, 0x0) [ 2024.152842][T14072] tc_dump_action: action bad kind [ 2024.161339][T14068] EXT4-fs (loop4): bad geometry: block count 196672 exceeds size of device (68 blocks) 09:29:11 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0xeaffffff, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600912d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2024.219350][T14079] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2024.237676][T14081] tc_dump_action: action bad kind [ 2024.271007][T14086] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 09:29:12 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c211, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x2000}}, 0x28}}, 0x0) 09:29:12 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6098000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040840300030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:12 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0xefffffff, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600922d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600932d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x2500}}, 0x28}}, 0x0) [ 2025.025653][T14102] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2025.035482][T14103] tc_dump_action: action bad kind [ 2025.057105][T14107] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 09:29:12 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0xf0ffffff, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2025.070820][T14108] loop4: detected capacity change from 0 to 545 [ 2025.084450][T14108] EXT4-fs (loop4): bad geometry: block count 230464 exceeds size of device (68 blocks) 09:29:12 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60a8000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600942d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:12 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0xfeffffff, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2025.117655][T14118] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2025.126951][T14117] tc_dump_action: action bad kind [ 2025.191308][T14125] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2025.217753][T14129] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 09:29:13 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c212, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040880300030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x4800}}, 0x28}}, 0x0) 09:29:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600952d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:13 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60b8000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:13 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:13 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0xffffff9e, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x4c00}}, 0x28}}, 0x0) 09:29:13 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60c8000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2025.971866][T14139] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2025.985077][T14141] tc_dump_action: action bad kind [ 2025.995336][T14142] loop4: detected capacity change from 0 to 545 [ 2026.009188][T14142] EXT4-fs (loop4): bad geometry: block count 231488 exceeds size of device (68 blocks) 09:29:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600962d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:13 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0xffffffea, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040d50300030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2026.066456][T14155] tc_dump_action: action bad kind [ 2026.154916][T14164] loop4: detected capacity change from 0 to 545 [ 2026.165998][T14164] EXT4-fs (loop4): bad geometry: block count 251200 exceeds size of device (68 blocks) 09:29:14 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c213, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x5cff}}, 0x28}}, 0x0) 09:29:14 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60d8000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:14 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0xffffffef, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600972d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040d60300030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:14 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60e8000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2026.935203][T14186] validate_nla: 63 callbacks suppressed [ 2026.935219][T14186] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2026.953785][T14187] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2026.963270][T14188] tc_dump_action: action bad kind [ 2026.967926][T14189] loop4: detected capacity change from 0 to 545 [ 2026.968421][T14185] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:29:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x6000}}, 0x28}}, 0x0) [ 2026.987337][T14189] EXT4-fs (loop4): bad geometry: block count 251456 exceeds size of device (68 blocks) [ 2027.003492][T14185] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:29:14 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0xfffffff0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2027.048081][T14194] netlink: 'syz-executor.3': attribute type 27 has an invalid length. 09:29:14 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6108000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600982d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040d70300030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2027.093590][T14185] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2027.122218][T14203] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2027.154520][T14204] tc_dump_action: action bad kind [ 2027.202141][T14211] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2027.211146][T14210] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2027.221171][T14212] loop4: detected capacity change from 0 to 545 [ 2027.228478][T14210] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2027.243209][T14212] EXT4-fs (loop4): bad geometry: block count 251712 exceeds size of device (68 blocks) 09:29:15 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c214, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:15 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0xfffffffe, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x6800}}, 0x28}}, 0x0) 09:29:15 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6118000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600992d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040d80300030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:15 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="0f0000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:15 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6128000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06009a2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:15 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="100000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2027.894833][T14236] tc_dump_action: action bad kind [ 2027.902102][T14235] loop4: detected capacity change from 0 to 545 09:29:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x6c00}}, 0x28}}, 0x0) 09:29:15 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6258000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2027.949116][T14235] EXT4-fs (loop4): bad geometry: block count 251968 exceeds size of device (68 blocks) [ 2028.058561][T14255] tc_dump_action: action bad kind 09:29:16 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c215, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06009b2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:16 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="c00000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:16 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6488000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x7400}}, 0x28}}, 0x0) 09:29:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040d90300030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:16 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a64c8000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x7a00}}, 0x28}}, 0x0) 09:29:16 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="c00e00001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06009c2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2028.798779][T14268] tc_dump_action: action bad kind [ 2028.805594][T14270] loop4: detected capacity change from 0 to 545 [ 2028.821694][T14270] EXT4-fs (loop4): bad geometry: block count 252224 exceeds size of device (68 blocks) 09:29:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040da0300030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:16 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6608000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2028.877541][T14282] tc_dump_action: action bad kind [ 2028.934050][T14293] loop4: detected capacity change from 0 to 545 [ 2028.960010][T14293] EXT4-fs (loop4): bad geometry: block count 252480 exceeds size of device (68 blocks) 09:29:17 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c216, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x8100}}, 0x28}}, 0x0) 09:29:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06009d2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:17 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="e03f03001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:17 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6688000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040db0300030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:17 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="8c0000201100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:17 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="00f0ff7f1100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2029.732984][T14314] __nla_validate_parse: 17 callbacks suppressed [ 2029.732998][T14314] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2029.749366][T14312] loop4: detected capacity change from 0 to 545 [ 2029.769817][T14312] EXT4-fs (loop4): bad geometry: block count 252736 exceeds size of device (68 blocks) 09:29:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0xc00e}}, 0x28}}, 0x0) 09:29:17 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a66c8000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06009e2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2029.792381][T14315] tc_dump_action: action bad kind 09:29:17 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="effdffff1100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2029.871627][T14331] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2029.886578][T14334] tc_dump_action: action bad kind 09:29:18 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c217, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040dc0300030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0xff5c}}, 0x28}}, 0x0) 09:29:18 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6748000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06009f2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:18 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2030.658000][T14350] tc_dump_action: action bad kind [ 2030.669360][T14352] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2030.679100][T14351] loop4: detected capacity change from 0 to 545 [ 2030.693343][T14351] EXT4-fs (loop4): bad geometry: block count 252992 exceeds size of device (68 blocks) 09:29:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x34000}}, 0x28}}, 0x0) 09:29:18 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0200001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2030.698133][T14357] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 09:29:18 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a67a8000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600a02d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040dd0300030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2030.774918][T14363] tc_dump_action: action bad kind 09:29:18 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0300001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2030.824842][T14375] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2030.841208][T14377] loop4: detected capacity change from 0 to 545 [ 2030.853393][T14377] EXT4-fs (loop4): bad geometry: block count 253248 exceeds size of device (68 blocks) 09:29:19 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c218, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600a12d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x400300}}, 0x28}}, 0x0) 09:29:19 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6000000001800000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:19 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0400001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040de0300030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x1000000}}, 0x28}}, 0x0) 09:29:19 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0500001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600a22d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2031.620065][T14400] tc_dump_action: action bad kind 09:29:19 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0600001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2031.663096][T14407] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2031.686519][T14411] tc_dump_action: action bad kind [ 2031.686704][T14402] loop4: detected capacity change from 0 to 545 [ 2031.703449][T14402] EXT4-fs (loop4): bad geometry: block count 253504 exceeds size of device (68 blocks) 09:29:19 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000004003440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x2000000}}, 0x28}}, 0x0) [ 2031.771975][T14421] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2031.815143][T14425] tc_dump_action: action bad kind 09:29:20 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c219, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600a32d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040df0300030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:20 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0700001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:20 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008002000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x3000000}}, 0x28}}, 0x0) [ 2032.580931][T14435] validate_nla: 46 callbacks suppressed [ 2032.580945][T14435] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2032.596217][T14435] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2032.606680][T14437] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2032.606961][T14436] loop4: detected capacity change from 0 to 545 [ 2032.614886][T14437] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 09:29:20 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0800001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600a42d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x4000000}}, 0x28}}, 0x0) [ 2032.630521][T14436] EXT4-fs (loop4): bad geometry: block count 253760 exceeds size of device (68 blocks) [ 2032.639368][T14441] tc_dump_action: action bad kind [ 2032.645591][T14435] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:29:20 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008003000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:20 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0900001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040ed0300030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2032.737353][T14454] tc_dump_action: action bad kind [ 2032.742546][T14453] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2032.755110][T14455] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2032.763360][T14455] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2032.782835][T14453] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2032.802098][T14453] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2032.817204][T14458] loop4: detected capacity change from 0 to 545 [ 2032.834551][T14458] EXT4-fs (loop4): bad geometry: block count 257344 exceeds size of device (68 blocks) 09:29:21 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c21a, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:21 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008004000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x5000000}}, 0x28}}, 0x0) 09:29:21 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0a00001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600a52d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040f00300030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:21 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008005000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:21 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0b00001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2033.510473][T14479] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2033.518703][T14479] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2033.529741][T14476] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2033.539201][T14484] tc_dump_action: action bad kind [ 2033.545898][T14482] loop4: detected capacity change from 0 to 545 09:29:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x6000000}}, 0x28}}, 0x0) 09:29:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600a62d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:21 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008006000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600a72d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2033.563375][T14482] EXT4-fs (loop4): bad geometry: block count 258112 exceeds size of device (68 blocks) [ 2033.626699][T14501] tc_dump_action: action bad kind 09:29:22 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x3c21b, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:22 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0c00001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040f10300030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:22 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008007000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x7000000}}, 0x28}}, 0x0) 09:29:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600a82d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:22 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0d00001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:22 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008008000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2034.424528][T14516] tc_dump_action: action bad kind 09:29:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x8000000}}, 0x28}}, 0x0) 09:29:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600a92d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:22 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008009000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:22 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800a000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2034.464404][T14520] loop4: detected capacity change from 0 to 545 [ 2034.489078][T14520] EXT4-fs (loop4): bad geometry: block count 258368 exceeds size of device (68 blocks) [ 2034.528518][T14534] tc_dump_action: action bad kind 09:29:22 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x100000, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:22 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0e00001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600aa2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x9000000}}, 0x28}}, 0x0) 09:29:22 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800b000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040f20300030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:23 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c1000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0xa000000}}, 0x28}}, 0x0) 09:29:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600ab2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2035.331761][T14552] tc_dump_action: action bad kind [ 2035.340016][T14556] __nla_validate_parse: 6 callbacks suppressed [ 2035.340030][T14556] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2035.358240][T14555] loop4: detected capacity change from 0 to 545 [ 2035.371150][T14555] EXT4-fs (loop4): bad geometry: block count 258624 exceeds size of device (68 blocks) 09:29:23 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c1100001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:23 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800c000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2035.433737][T14567] tc_dump_action: action bad kind 09:29:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600ac2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2035.508885][T14576] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 09:29:23 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x7ffffff2, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040f30300030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:23 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c1200001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0xb000000}}, 0x28}}, 0x0) 09:29:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600ad2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:23 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800d000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:23 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c2500001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2036.256126][T14583] loop4: detected capacity change from 0 to 545 [ 2036.277384][T14593] tc_dump_action: action bad kind [ 2036.287259][T14594] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 09:29:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600ae2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0xc000000}}, 0x28}}, 0x0) 09:29:24 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c4800001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:24 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800e000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2036.304533][T14583] EXT4-fs (loop4): bad geometry: block count 258880 exceeds size of device (68 blocks) 09:29:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600af2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2036.389609][T14607] tc_dump_action: action bad kind [ 2036.403182][T14608] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 09:29:24 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x7ffffff8, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:24 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c4c00001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040f40300030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0xd000000}}, 0x28}}, 0x0) 09:29:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600b02d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:24 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008010000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:24 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c6000001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0xe000000}}, 0x28}}, 0x0) 09:29:24 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008011000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2037.166603][T14628] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2037.176332][T14622] tc_dump_action: action bad kind [ 2037.203441][T14631] loop4: detected capacity change from 0 to 545 09:29:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600b12d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:24 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c6800001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x10000000}}, 0x28}}, 0x0) [ 2037.221217][T14631] EXT4-fs (loop4): bad geometry: block count 259136 exceeds size of device (68 blocks) [ 2037.238109][T14639] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2037.248824][T14640] tc_dump_action: action bad kind [ 2037.338765][T14653] tc_dump_action: action bad kind 09:29:25 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x7ffffff9, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:25 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008012000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040f50300030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600b22d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:25 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c6c00001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x11000000}}, 0x28}}, 0x0) 09:29:25 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c7400001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2038.080007][T14664] tc_dump_action: action bad kind [ 2038.086293][T14666] validate_nla: 50 callbacks suppressed [ 2038.086310][T14666] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2038.101155][T14668] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2038.109385][T14668] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2038.119614][T14667] loop4: detected capacity change from 0 to 545 09:29:25 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008025000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:25 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c7a00001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x12000000}}, 0x28}}, 0x0) [ 2038.119686][T14666] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2038.136089][T14666] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2038.145189][T14667] EXT4-fs (loop4): bad geometry: block count 259392 exceeds size of device (68 blocks) 09:29:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600b32d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:25 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0003001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2038.187389][T14679] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2038.195669][T14679] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2038.209672][T14680] tc_dump_action: action bad kind [ 2038.242536][T14687] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2038.251259][T14687] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2038.261914][T14687] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:29:26 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x7ffffffc, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040020400030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:26 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0005001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x14000000}}, 0x28}}, 0x0) 09:29:26 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008048000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600b42d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x20000000}}, 0x28}}, 0x0) [ 2038.988020][T14701] tc_dump_action: action bad kind [ 2038.997924][T14702] loop4: detected capacity change from 0 to 545 [ 2039.006674][T14704] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2039.014972][T14704] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2039.021338][T14702] EXT4-fs (loop4): bad geometry: block count 262720 exceeds size of device (68 blocks) 09:29:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600b52d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:26 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0006001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040060400030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2039.034908][T14705] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2039.054871][T14712] tc_dump_action: action bad kind 09:29:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600b62d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x25000000}}, 0x28}}, 0x0) [ 2039.158558][T14728] tc_dump_action: action bad kind [ 2039.163696][T14724] loop4: detected capacity change from 0 to 545 [ 2039.182357][T14724] EXT4-fs (loop4): bad geometry: block count 263744 exceeds size of device (68 blocks) 09:29:27 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x7ffffffe, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:27 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600804c000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600b72d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:27 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0007001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x48000000}}, 0x28}}, 0x0) 09:29:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040100400030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x4c000000}}, 0x28}}, 0x0) [ 2039.940391][T14739] tc_dump_action: action bad kind [ 2039.971106][T14749] loop4: detected capacity change from 0 to 545 [ 2039.980295][T14749] EXT4-fs (loop4): bad geometry: block count 266304 exceeds size of device (68 blocks) 09:29:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600b82d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:27 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008060000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:27 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0009001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2039.992181][T14750] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2040.010215][T14756] tc_dump_action: action bad kind 09:29:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000500030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x60000000}}, 0x28}}, 0x0) [ 2040.083233][T14768] loop4: detected capacity change from 0 to 545 [ 2040.095527][T14768] EXT4-fs (loop4): bad geometry: block count 327744 exceeds size of device (68 blocks) [ 2040.117388][T14775] tc_dump_action: action bad kind 09:29:28 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff8881019f4318, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:28 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008068000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:28 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c000a001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600b92d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000600030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x68000000}}, 0x28}}, 0x0) 09:29:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600ba2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:28 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c000b001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:28 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600806c000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2040.901994][T14788] __nla_validate_parse: 1 callbacks suppressed [ 2040.902009][T14788] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2040.918222][T14793] tc_dump_action: action bad kind [ 2040.925469][T14789] loop4: detected capacity change from 0 to 545 [ 2040.935510][T14789] EXT4-fs (loop4): bad geometry: block count 393280 exceeds size of device (68 blocks) 09:29:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x6c000000}}, 0x28}}, 0x0) 09:29:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x74000000}}, 0x28}}, 0x0) 09:29:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040040600030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2041.000078][T14806] tc_dump_action: action bad kind [ 2041.005746][T14803] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2041.047204][T14809] tc_dump_action: action bad kind [ 2041.070860][T14813] loop4: detected capacity change from 0 to 545 [ 2041.084528][T14813] EXT4-fs (loop4): bad geometry: block count 394304 exceeds size of device (68 blocks) 09:29:29 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff8881019f4698, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:29 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c000c001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600bb2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:29 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008074000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x7a000000}}, 0x28}}, 0x0) 09:29:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000700030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:29 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600807a000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:29 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c000d001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600bc2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x81000000}}, 0x28}}, 0x0) [ 2041.831033][T14831] loop4: detected capacity change from 0 to 545 [ 2041.831690][T14837] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2041.847549][T14832] tc_dump_action: action bad kind [ 2041.867430][T14831] EXT4-fs (loop4): bad geometry: block count 458816 exceeds size of device (68 blocks) 09:29:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x81ffffff}}, 0x28}}, 0x0) 09:29:29 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c000e001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2041.907876][T14846] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2041.918759][T14849] tc_dump_action: action bad kind [ 2041.960535][T14852] tc_dump_action: action bad kind 09:29:30 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff888101a0b898, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600bd2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:30 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0011001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:30 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000030000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000900030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x9effffff}}, 0x28}}, 0x0) 09:29:30 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0012001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2042.765299][T14870] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2042.786173][T14874] tc_dump_action: action bad kind [ 2042.794136][T14875] loop4: detected capacity change from 0 to 545 09:29:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600be2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:30 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000050000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0xc00e0000}}, 0x28}}, 0x0) 09:29:30 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000060000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:30 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0020001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2042.815273][T14875] EXT4-fs (loop4): bad geometry: block count 589888 exceeds size of device (68 blocks) [ 2042.843987][T14883] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2042.927878][T14893] tc_dump_action: action bad kind [ 2042.936678][T14896] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 09:29:31 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff888101a13c98, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000a00030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600bf2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:31 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0025001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0xeaffffff}}, 0x28}}, 0x0) 09:29:31 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000070000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2043.704928][T14906] validate_nla: 42 callbacks suppressed [ 2043.704977][T14906] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2043.718772][T14906] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2043.721703][T14909] loop4: detected capacity change from 0 to 545 [ 2043.744004][T14911] tc_dump_action: action bad kind 09:29:31 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0048001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0xefffffff}}, 0x28}}, 0x0) [ 2043.750937][T14912] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2043.753726][T14909] EXT4-fs (loop4): bad geometry: block count 655424 exceeds size of device (68 blocks) [ 2043.772125][T14912] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:29:31 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000090000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2043.799309][T14912] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:29:31 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c004c001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600c02d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2043.840818][T14919] tc_dump_action: action bad kind 09:29:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0xf0ffffff}}, 0x28}}, 0x0) [ 2043.885792][T14922] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2043.894006][T14922] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2043.929213][T14930] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2043.942011][T14933] tc_dump_action: action bad kind [ 2043.949887][T14930] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2043.968515][T14930] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:29:32 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff88813b711498, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000b00030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:32 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c974c001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:32 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000a0000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0xfeffffff}}, 0x28}}, 0x0) 09:29:32 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600c12d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:32 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0060001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0xff5c0000}}, 0x28}}, 0x0) 09:29:32 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0068001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2044.643833][T14945] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2044.652080][T14945] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2044.661593][T14944] loop4: detected capacity change from 0 to 545 [ 2044.661953][T14947] tc_dump_action: action bad kind [ 2044.674500][T14948] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2044.683854][T14944] EXT4-fs (loop4): bad geometry: block count 720960 exceeds size of device (68 blocks) 09:29:32 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600c22d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:32 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000b0000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000c00030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2044.760343][T14963] tc_dump_action: action bad kind [ 2044.853738][T14972] loop4: detected capacity change from 0 to 545 [ 2044.877651][T14972] EXT4-fs (loop4): bad geometry: block count 786496 exceeds size of device (68 blocks) 09:29:33 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff88813b711618, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0xffffff7f}}, 0x28}}, 0x0) 09:29:33 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c006c001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600c32d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:33 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000c0000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000d00030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:33 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0074001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:33 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000d0000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:33 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000e0000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600c42d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2045.601699][T14990] loop4: detected capacity change from 0 to 545 [ 2045.609576][T14993] tc_dump_action: action bad kind [ 2045.624239][T14990] EXT4-fs (loop4): bad geometry: block count 852032 exceeds size of device (68 blocks) 09:29:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000e00030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0xffffff81}}, 0x28}}, 0x0) [ 2045.734288][T15012] tc_dump_action: action bad kind [ 2045.777072][T15011] loop4: detected capacity change from 0 to 545 [ 2045.785441][T15011] EXT4-fs (loop4): bad geometry: block count 917568 exceeds size of device (68 blocks) 09:29:34 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff88813b711c18, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:34 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c007a001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0xffffff9e}}, 0x28}}, 0x0) 09:29:34 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000110000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:34 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600c52d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000f00030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:34 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c4c97001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:34 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600c62d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2046.535533][T15031] loop4: detected capacity change from 0 to 545 [ 2046.546044][T15035] __nla_validate_parse: 4 callbacks suppressed [ 2046.546122][T15035] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2046.559686][T15031] EXT4-fs (loop4): bad geometry: block count 983104 exceeds size of device (68 blocks) [ 2046.564389][T15038] tc_dump_action: action bad kind 09:29:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0xffffffea}}, 0x28}}, 0x0) 09:29:34 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000120000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:34 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600c72d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040011000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2046.679665][T15053] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2046.689880][T15054] tc_dump_action: action bad kind [ 2046.752569][T15061] loop4: detected capacity change from 0 to 545 [ 2046.762593][T15061] EXT4-fs (loop4): bad geometry: block count 1048896 exceeds size of device (68 blocks) 09:29:35 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff88813d9d3018, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:35 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000007700fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:35 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000200000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0xffffffef}}, 0x28}}, 0x0) 09:29:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600c82d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040041000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:35 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0002001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2047.461080][T15080] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2047.465344][T15081] loop4: detected capacity change from 0 to 545 [ 2047.478410][T15085] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=119 sclass=netlink_route_socket pid=15085 comm=syz-executor.0 [ 2047.483255][T15081] EXT4-fs (loop4): bad geometry: block count 1049664 exceeds size of device (68 blocks) [ 2047.495747][T15083] tc_dump_action: action bad kind 09:29:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0xfffffff0}}, 0x28}}, 0x0) 09:29:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600c92d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:35 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000250000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:35 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0003001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040201000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2047.593809][T15099] tc_dump_action: action bad kind [ 2047.634067][T15105] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2047.658471][T15106] loop4: detected capacity change from 0 to 545 [ 2047.680968][T15106] EXT4-fs (loop4): bad geometry: block count 1056832 exceeds size of device (68 blocks) 09:29:36 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff88813d9d3a18, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0xfffffffe}}, 0x28}}, 0x0) 09:29:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600ca2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:36 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0004001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:36 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600804b460000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040001100030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600cb2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:36 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0005001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}}, 0x0) [ 2048.386845][T15130] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2048.396275][T15129] loop4: detected capacity change from 0 to 545 [ 2048.398508][T15128] tc_dump_action: action bad kind [ 2048.417921][T15129] EXT4-fs (loop4): bad geometry: block count 1114176 exceeds size of device (68 blocks) 09:29:36 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000480000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600cc2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:36 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0006001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2048.476050][T15140] tc_dump_action: action bad kind [ 2048.544322][T15145] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 09:29:36 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff88813e6eb298, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x2}}, 0x28}}, 0x0) 09:29:36 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0007001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040001200030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:36 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080464b0000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600cd2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:37 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0008001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2049.309814][T15166] validate_nla: 45 callbacks suppressed [ 2049.309830][T15166] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2049.323652][T15167] tc_dump_action: action bad kind [ 2049.330542][T15169] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2049.338817][T15169] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2049.351955][T15168] loop4: detected capacity change from 0 to 545 09:29:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x3}}, 0x28}}, 0x0) 09:29:37 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0009001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x4}}, 0x28}}, 0x0) 09:29:37 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c000a001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:37 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c000b001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2049.368965][T15168] EXT4-fs (loop4): bad geometry: block count 1179712 exceeds size of device (68 blocks) [ 2049.384843][T15166] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2049.397983][T15177] tc_dump_action: action bad kind [ 2049.486032][T15187] tc_dump_action: action bad kind 09:29:37 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff88813e886218, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:37 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600ce2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:37 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080004c0000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:37 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c000c001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040021900030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x5}}, 0x28}}, 0x0) [ 2050.226284][T15203] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2050.241331][T15206] tc_dump_action: action bad kind [ 2050.248732][T15209] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2050.260106][T15209] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 09:29:37 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c000d001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x6}}, 0x28}}, 0x0) 09:29:38 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c000e001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2050.274658][T15207] loop4: detected capacity change from 0 to 545 [ 2050.280525][T15211] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2050.298669][T15207] EXT4-fs (loop4): bad geometry: block count 1638976 exceeds size of device (68 blocks) 09:29:38 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000600000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600cf2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2050.357473][T15203] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2050.386421][T15221] tc_dump_action: action bad kind 09:29:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040002000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2050.422311][T15224] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2050.430663][T15224] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2050.446472][T15229] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2050.457365][T15229] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2050.483631][T15231] loop4: detected capacity change from 0 to 545 [ 2050.509143][T15231] EXT4-fs (loop4): bad geometry: block count 2097216 exceeds size of device (68 blocks) 09:29:38 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff88813e886298, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x7}}, 0x28}}, 0x0) 09:29:38 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0010001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600d02d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:38 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000680000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040102000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:38 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0011001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600d12d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2051.191074][T15252] tc_dump_action: action bad kind [ 2051.197969][T15254] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2051.214922][T15258] loop4: detected capacity change from 0 to 545 09:29:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x8}}, 0x28}}, 0x0) 09:29:38 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080006c0000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600d22d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:39 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000740000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2051.269932][T15258] EXT4-fs (loop4): bad geometry: block count 2101312 exceeds size of device (68 blocks) [ 2051.330370][T15271] tc_dump_action: action bad kind 09:29:39 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff88813e886418, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:39 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0012001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600d32d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x9}}, 0x28}}, 0x0) 09:29:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040022100030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:39 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080007a0000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2052.095669][T15284] __nla_validate_parse: 2 callbacks suppressed [ 2052.095685][T15284] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2052.128375][T15292] tc_dump_action: action bad kind 09:29:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0xa}}, 0x28}}, 0x0) [ 2052.141738][T15295] loop4: detected capacity change from 0 to 545 09:29:39 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0025001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:39 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000400300000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600d42d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2052.171336][T15295] EXT4-fs (loop4): bad geometry: block count 2163264 exceeds size of device (68 blocks) [ 2052.202545][T15303] tc_dump_action: action bad kind 09:29:39 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0048001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0xb}}, 0x28}}, 0x0) [ 2052.227660][T15308] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2052.284804][T15317] tc_dump_action: action bad kind 09:29:40 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff88813e886e98, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:40 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000034000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600d52d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040002200030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0xc}}, 0x28}}, 0x0) 09:29:40 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c004c001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600d62d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0xd}}, 0x28}}, 0x0) 09:29:40 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0060001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:40 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800400ad00000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2053.048437][T15326] tc_dump_action: action bad kind [ 2053.055063][T15329] loop4: detected capacity change from 0 to 545 [ 2053.063708][T15329] EXT4-fs (loop4): bad geometry: block count 2228288 exceeds size of device (68 blocks) [ 2053.072952][T15336] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 09:29:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600d72d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040002500030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2053.114172][T15343] tc_dump_action: action bad kind [ 2053.132881][T15350] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2053.190673][T15358] loop4: detected capacity change from 0 to 545 [ 2053.201012][T15358] EXT4-fs (loop4): bad geometry: block count 2424896 exceeds size of device (68 blocks) 09:29:41 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff88813e886f18, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0xe}}, 0x28}}, 0x0) 09:29:41 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0068001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600d82d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:41 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000001000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040e82600030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:41 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c006c001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:41 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000002000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2053.971359][T15379] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2053.985936][T15380] tc_dump_action: action bad kind [ 2053.994976][T15378] loop4: detected capacity change from 0 to 545 [ 2054.010737][T15387] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 09:29:41 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000003000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600d92d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x10}}, 0x28}}, 0x0) 09:29:41 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0074001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2054.021197][T15378] EXT4-fs (loop4): bad geometry: block count 2549824 exceeds size of device (68 blocks) [ 2054.054243][T15392] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2054.080995][T15397] tc_dump_action: action bad kind 09:29:42 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff88813ef26218, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:42 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000004000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600da2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:42 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c007a001100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x11}}, 0x28}}, 0x0) 09:29:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040022700030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x12}}, 0x28}}, 0x0) 09:29:42 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000031100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2054.890089][T15411] validate_nla: 41 callbacks suppressed [ 2054.890103][T15411] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2054.903836][T15417] tc_dump_action: action bad kind [ 2054.913864][T15418] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2054.922096][T15418] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2054.933445][T15419] loop4: detected capacity change from 0 to 545 09:29:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040002e00030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:42 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000051100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2054.944127][T15423] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2054.952360][T15422] tc_dump_action: action bad kind [ 2054.952462][T15419] EXT4-fs (loop4): bad geometry: block count 2556480 exceeds size of device (68 blocks) 09:29:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x14}}, 0x28}}, 0x0) 09:29:42 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000061100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2054.992638][T15411] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2055.050159][T15436] tc_dump_action: action bad kind [ 2055.062964][T15434] loop4: detected capacity change from 0 to 545 [ 2055.071040][T15434] EXT4-fs (loop4): bad geometry: block count 3014720 exceeds size of device (68 blocks) 09:29:43 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff88813ef26918, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:43 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000ad0004000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600db2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:43 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000071100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x25}}, 0x28}}, 0x0) 09:29:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040003f00030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:43 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000091100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x48}}, 0x28}}, 0x0) [ 2055.785239][T15454] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2055.803710][T15460] tc_dump_action: action bad kind [ 2055.810400][T15461] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2055.818608][T15461] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2055.828020][T15458] loop4: detected capacity change from 0 to 545 09:29:43 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c00000a1100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:43 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c00000b1100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2055.836529][T15454] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2055.859364][T15458] EXT4-fs (loop4): bad geometry: block count 4128832 exceeds size of device (68 blocks) [ 2055.877530][T15454] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:29:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x4c}}, 0x28}}, 0x0) [ 2055.893137][T15471] tc_dump_action: action bad kind 09:29:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600dc2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2055.924444][T15474] tc_dump_action: action bad kind [ 2055.953604][T15481] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2055.979460][T15481] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:29:44 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff88813ef26f98, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:44 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000005000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x60}}, 0x28}}, 0x0) 09:29:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040004000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:44 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c00000c1100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600dd2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x68}}, 0x28}}, 0x0) 09:29:44 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c00000d1100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2056.696834][T15494] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2056.713469][T15498] tc_dump_action: action bad kind [ 2056.719959][T15499] loop4: detected capacity change from 0 to 545 09:29:44 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000006000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600de2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2056.745807][T15499] EXT4-fs (loop4): bad geometry: block count 4194368 exceeds size of device (68 blocks) 09:29:44 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c00000e1100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x6c}}, 0x28}}, 0x0) [ 2056.805929][T15509] tc_dump_action: action bad kind [ 2056.873212][T15519] tc_dump_action: action bad kind 09:29:45 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff88814181de98, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:45 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000007000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600df2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040004400030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:45 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000111100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x74}}, 0x28}}, 0x0) 09:29:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600e02d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:45 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000008000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:45 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000121100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2057.600885][T15531] tc_dump_action: action bad kind [ 2057.606027][T15533] __nla_validate_parse: 1 callbacks suppressed [ 2057.606041][T15533] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 09:29:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x7a}}, 0x28}}, 0x0) [ 2057.647402][T15535] loop4: detected capacity change from 0 to 545 [ 2057.655817][T15535] EXT4-fs (loop4): bad geometry: block count 4456512 exceeds size of device (68 blocks) 09:29:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600e12d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:45 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000201100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2057.688190][T15549] tc_dump_action: action bad kind [ 2057.695115][T15548] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 09:29:46 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff88814184b698, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x300}}, 0x28}}, 0x0) 09:29:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040004800030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:46 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000009000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600e22d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:46 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000251100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600e32d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:46 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000481100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2058.529250][T15569] loop4: detected capacity change from 0 to 545 [ 2058.537795][T15569] EXT4-fs (loop4): bad geometry: block count 4718656 exceeds size of device (68 blocks) [ 2058.547068][T15575] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2058.558060][T15577] tc_dump_action: action bad kind 09:29:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x500}}, 0x28}}, 0x0) 09:29:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600e42d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:46 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000000a000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040004c00030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2058.671727][T15590] tc_dump_action: action bad kind [ 2058.686886][T15593] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2058.689171][T15595] loop4: detected capacity change from 0 to 545 [ 2058.706959][T15595] EXT4-fs (loop4): bad geometry: block count 4980800 exceeds size of device (68 blocks) 09:29:47 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff88814184b798, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:47 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c00004c1100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600e52d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x600}}, 0x28}}, 0x0) 09:29:47 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000000b000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040006000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:47 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c00974c1100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600e62d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:47 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000601100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2059.451943][T15618] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2059.461690][T15617] tc_dump_action: action bad kind [ 2059.471598][T15619] loop4: detected capacity change from 0 to 545 09:29:47 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000000c000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x700}}, 0x28}}, 0x0) 09:29:47 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000000d000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2059.509587][T15619] EXT4-fs (loop4): bad geometry: block count 6291520 exceeds size of device (68 blocks) [ 2059.546233][T15632] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2059.560200][T15633] tc_dump_action: action bad kind [ 2059.616307][T15639] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 09:29:48 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff88814184b898, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600e72d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:48 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000681100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x900}}, 0x28}}, 0x0) 09:29:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040006800030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:48 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000000e000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:48 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c00006c1100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2060.374497][T15649] tc_dump_action: action bad kind [ 2060.385486][T15653] validate_nla: 42 callbacks suppressed [ 2060.385500][T15653] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2060.399307][T15653] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2060.411641][T15656] loop4: detected capacity change from 0 to 545 09:29:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0xa00}}, 0x28}}, 0x0) [ 2060.413210][T15654] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2060.426840][T15656] EXT4-fs (loop4): bad geometry: block count 6815808 exceeds size of device (68 blocks) [ 2060.448078][T15654] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2060.463756][T15654] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:29:48 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000010000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600e82d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:48 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000741100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2060.471929][T15662] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:29:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040006c00030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2060.558931][T15671] tc_dump_action: action bad kind [ 2060.570196][T15675] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2060.578445][T15675] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2060.589147][T15676] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2060.603156][T15676] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2060.616394][T15677] loop4: detected capacity change from 0 to 545 [ 2060.627909][T15677] EXT4-fs (loop4): bad geometry: block count 7077952 exceeds size of device (68 blocks) [ 2060.642644][T15676] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:29:48 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff88814184bb18, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:48 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c00007a1100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:48 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000011000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0xb00}}, 0x28}}, 0x0) 09:29:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600e92d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040007400030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2061.327598][T15695] tc_dump_action: action bad kind 09:29:49 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c004c971100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0xc00}}, 0x28}}, 0x0) [ 2061.356537][T15699] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2061.364820][T15699] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2061.391614][T15700] loop4: detected capacity change from 0 to 545 09:29:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600ea2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600eb2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:49 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000021100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040007a00030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2061.404829][T15700] EXT4-fs (loop4): bad geometry: block count 7602240 exceeds size of device (68 blocks) [ 2061.428277][T15711] tc_dump_action: action bad kind [ 2061.502033][T15722] loop4: detected capacity change from 0 to 545 [ 2061.511963][T15722] EXT4-fs (loop4): bad geometry: block count 7995456 exceeds size of device (68 blocks) 09:29:49 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff888141851218, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:49 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000012000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0xd00}}, 0x28}}, 0x0) 09:29:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600ec2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:49 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000031100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040038400030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:49 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000020000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:49 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000041100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:49 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000025000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2062.261371][T15742] loop4: detected capacity change from 0 to 545 [ 2062.274894][T15745] tc_dump_action: action bad kind 09:29:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600ed2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:50 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000051100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:50 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000004b46000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2062.317956][T15742] EXT4-fs (loop4): bad geometry: block count 8651584 exceeds size of device (68 blocks) 09:29:50 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff888141851398, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0xe00}}, 0x28}}, 0x0) 09:29:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040038800030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600ee2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:50 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000048000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:50 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000061100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:50 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000071100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0xec0}}, 0x28}}, 0x0) 09:29:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600ef2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2063.166265][T15775] loop4: detected capacity change from 0 to 545 [ 2063.168328][T15779] __nla_validate_parse: 4 callbacks suppressed [ 2063.168340][T15779] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2063.189090][T15775] EXT4-fs (loop4): bad geometry: block count 8913728 exceeds size of device (68 blocks) [ 2063.190032][T15782] tc_dump_action: action bad kind 09:29:50 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000004c000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004003d500030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:50 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000081100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2063.258519][T15793] tc_dump_action: action bad kind [ 2063.295422][T15801] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2063.312831][T15799] loop4: detected capacity change from 0 to 545 [ 2063.321487][T15799] EXT4-fs (loop4): bad geometry: block count 13960000 exceeds size of device (68 blocks) 09:29:51 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff888141851598, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x1100}}, 0x28}}, 0x0) 09:29:51 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000091100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600f02d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:51 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000060000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004003d600030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:51 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c00000a1100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x1200}}, 0x28}}, 0x0) 09:29:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600f12d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2064.081945][T15818] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2064.091935][T15822] tc_dump_action: action bad kind [ 2064.108259][T15825] loop4: detected capacity change from 0 to 545 09:29:51 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000068000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2064.124155][T15825] EXT4-fs (loop4): bad geometry: block count 14025536 exceeds size of device (68 blocks) 09:29:51 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c00000b1100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004003d700030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2064.162677][T15836] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2064.173467][T15838] tc_dump_action: action bad kind [ 2064.205154][T15843] loop4: detected capacity change from 0 to 545 [ 2064.212342][T15843] EXT4-fs (loop4): bad geometry: block count 14091072 exceeds size of device (68 blocks) 09:29:52 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff888141851698, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:52 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000006c000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x1400}}, 0x28}}, 0x0) 09:29:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600f22d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:52 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c00000c1100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004003d800030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:52 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000074000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600f32d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x2000}}, 0x28}}, 0x0) [ 2064.980130][T15857] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2064.996400][T15863] tc_dump_action: action bad kind 09:29:52 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c00000d1100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2065.032448][T15868] loop4: detected capacity change from 0 to 545 [ 2065.053867][T15872] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 09:29:52 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c00000e1100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:52 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000007a000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2065.082168][T15868] EXT4-fs (loop4): bad geometry: block count 14156608 exceeds size of device (68 blocks) [ 2065.093227][T15875] tc_dump_action: action bad kind [ 2065.171271][T15889] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 09:29:53 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff888141851c18, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x2500}}, 0x28}}, 0x0) 09:29:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600f42d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:53 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000101100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004003d900030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:53 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080ffffff9e000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:53 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000111100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2065.938162][T15902] validate_nla: 44 callbacks suppressed [ 2065.938173][T15902] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2065.941630][T15903] loop4: detected capacity change from 0 to 545 [ 2065.943793][T15902] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2065.973285][T15904] tc_dump_action: action bad kind 09:29:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x4800}}, 0x28}}, 0x0) 09:29:53 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000121100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2065.979722][T15903] EXT4-fs (loop4): bad geometry: block count 14222144 exceeds size of device (68 blocks) [ 2065.984736][T15908] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:29:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004003da00030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:53 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080ffffffc3000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x4c00}}, 0x28}}, 0x0) [ 2066.033826][T15908] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2066.045512][T15917] tc_dump_action: action bad kind [ 2066.051296][T15908] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2066.096980][T15923] loop4: detected capacity change from 0 to 545 [ 2066.117314][T15923] EXT4-fs (loop4): bad geometry: block count 14287680 exceeds size of device (68 blocks) [ 2066.130559][T15926] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2066.138849][T15926] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2066.155386][T15929] tc_dump_action: action bad kind 09:29:54 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff888141851e18, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:54 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000251100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600f52d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:54 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080ffffffea000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x5cff}}, 0x28}}, 0x0) 09:29:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004003db00030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:54 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000481100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:54 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080ffffffef000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2066.873034][T15947] loop4: detected capacity change from 0 to 545 [ 2066.874447][T15950] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2066.888264][T15950] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2066.898878][T15949] tc_dump_action: action bad kind [ 2066.904981][T15947] EXT4-fs (loop4): bad geometry: block count 14353216 exceeds size of device (68 blocks) 09:29:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x6000}}, 0x28}}, 0x0) [ 2066.915594][T15951] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2066.936464][T15951] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2066.947840][T15957] netlink: 'syz-executor.3': attribute type 27 has an invalid length. 09:29:54 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c00004c1100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2066.966120][T15951] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:29:54 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080fffffff0000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004003dc00030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2067.000532][T15964] tc_dump_action: action bad kind [ 2067.063861][T15972] loop4: detected capacity change from 0 to 545 [ 2067.085457][T15972] EXT4-fs (loop4): bad geometry: block count 14418752 exceeds size of device (68 blocks) 09:29:55 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff88814194f318, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600f62d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x6800}}, 0x28}}, 0x0) 09:29:55 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000601100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:55 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080fffffffc000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004003dd00030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:55 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080fffffffe000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:55 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000681100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:55 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c00006c1100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600f72d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:55 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600807fffffff000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x6c00}}, 0x28}}, 0x0) [ 2067.788968][T15991] loop4: detected capacity change from 0 to 545 [ 2067.793783][T15994] tc_dump_action: action bad kind [ 2067.806685][T15991] EXT4-fs (loop4): bad geometry: block count 14484288 exceeds size of device (68 blocks) [ 2067.908839][T16014] tc_dump_action: action bad kind 09:29:56 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff88814194fe98, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004003de00030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:56 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600809effffff000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:56 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000741100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600f82d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x7400}}, 0x28}}, 0x0) 09:29:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x7a00}}, 0x28}}, 0x0) 09:29:56 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c00007a1100fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2068.714579][T16027] __nla_validate_parse: 5 callbacks suppressed [ 2068.714594][T16027] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2068.730665][T16030] tc_dump_action: action bad kind [ 2068.741122][T16029] loop4: detected capacity change from 0 to 545 09:29:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600f92d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2068.764035][T16029] EXT4-fs (loop4): bad geometry: block count 14549824 exceeds size of device (68 blocks) 09:29:56 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080c3ffffff000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:56 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000007700fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2068.806945][T16040] tc_dump_action: action bad kind 09:29:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x8100}}, 0x28}}, 0x0) [ 2068.855766][T16045] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2068.886290][T16047] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=119 sclass=netlink_route_socket pid=16047 comm=syz-executor.0 [ 2068.912420][T16053] tc_dump_action: action bad kind 09:29:57 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff888141a2da98, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600fa2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004003df00030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:57 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080eaffffff000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:57 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0xc00e}}, 0x28}}, 0x0) 09:29:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0xff5c}}, 0x28}}, 0x0) [ 2069.643407][T16065] tc_dump_action: action bad kind [ 2069.649838][T16066] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2069.664541][T16067] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2069.673986][T16068] loop4: detected capacity change from 0 to 545 09:29:57 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000007700fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600fb2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:57 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080efffffff000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2069.711175][T16068] EXT4-fs (loop4): bad geometry: block count 14615360 exceeds size of device (68 blocks) 09:29:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x34000}}, 0x28}}, 0x0) 09:29:57 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001102fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2069.760631][T16076] tc_dump_action: action bad kind [ 2069.770383][T16079] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=119 sclass=netlink_route_socket pid=16079 comm=syz-executor.0 [ 2069.791419][T16080] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2069.870000][T16090] tc_dump_action: action bad kind [ 2069.876003][T16092] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=529 sclass=netlink_route_socket pid=16092 comm=syz-executor.0 09:29:58 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff888141a63018, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600fc2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004026e800030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:58 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080f0ffffff000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:58 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001103fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x400300}}, 0x28}}, 0x0) 09:29:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600fd2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x1000000}}, 0x28}}, 0x0) 09:29:58 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080fcffffff000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2070.557549][T16102] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=785 sclass=netlink_route_socket pid=16102 comm=syz-executor.0 [ 2070.571086][T16103] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2070.579607][T16106] loop4: detected capacity change from 0 to 545 [ 2070.590406][T16107] tc_dump_action: action bad kind [ 2070.591828][T16106] EXT4-fs (loop4): bad geometry: block count 15214144 exceeds size of device (68 blocks) 09:29:58 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001104fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600fe2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004003ed00030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2070.680359][T16119] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2070.689768][T16120] tc_dump_action: action bad kind [ 2070.697130][T16122] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1041 sclass=netlink_route_socket pid=16122 comm=syz-executor.0 [ 2070.743312][T16128] loop4: detected capacity change from 0 to 545 [ 2070.761568][T16128] EXT4-fs (loop4): bad geometry: block count 15532864 exceeds size of device (68 blocks) 09:29:59 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff888141a63198, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:29:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x2000000}}, 0x28}}, 0x0) 09:29:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600ff2d000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:29:59 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080feffffff000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:59 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001105fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:59 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004003f000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:29:59 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000020000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2071.508736][T16149] validate_nla: 39 callbacks suppressed [ 2071.508750][T16149] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2071.522672][T16149] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2071.532095][T16153] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2071.540351][T16152] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1297 sclass=netlink_route_socket pid=16152 comm=syz-executor.0 09:29:59 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001106fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x3000000}}, 0x28}}, 0x0) [ 2071.544373][T16151] loop4: detected capacity change from 0 to 545 [ 2071.559746][T16154] tc_dump_action: action bad kind [ 2071.580910][T16153] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2071.588851][T16160] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1553 sclass=netlink_route_socket pid=16160 comm=syz-executor.0 09:29:59 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001107fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:29:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600002e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2071.604873][T16161] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2071.613130][T16161] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2071.622415][T16151] EXT4-fs (loop4): bad geometry: block count 15729472 exceeds size of device (68 blocks) 09:29:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x4000000}}, 0x28}}, 0x0) [ 2071.661223][T16164] tc_dump_action: action bad kind [ 2071.662028][T16167] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1809 sclass=netlink_route_socket pid=16167 comm=syz-executor.0 [ 2071.695535][T16172] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2071.706385][T16172] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2071.715067][T16172] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2071.747592][T16177] tc_dump_action: action bad kind 09:30:00 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff888141a63218, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004003f100030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:00 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000030000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:00 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001108fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600012e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x5000000}}, 0x28}}, 0x0) [ 2072.434092][T16189] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2072.442328][T16189] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2072.453301][T16190] loop4: detected capacity change from 0 to 545 [ 2072.459719][T16191] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2072.462582][T16194] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2065 sclass=netlink_route_socket pid=16194 comm=syz-executor.0 09:30:00 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000040000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:00 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001109fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x6000000}}, 0x28}}, 0x0) 09:30:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600022e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2072.475918][T16190] EXT4-fs (loop4): bad geometry: block count 15795008 exceeds size of device (68 blocks) [ 2072.484247][T16195] tc_dump_action: action bad kind [ 2072.496150][T16191] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:30:00 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000050000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004003f200030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2072.575926][T16206] tc_dump_action: action bad kind [ 2072.584052][T16207] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2321 sclass=netlink_route_socket pid=16207 comm=syz-executor.0 [ 2072.650454][T16215] loop4: detected capacity change from 0 to 545 [ 2072.660956][T16215] EXT4-fs (loop4): bad geometry: block count 15860544 exceeds size of device (68 blocks) 09:30:01 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff888141ab6218, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x7000000}}, 0x28}}, 0x0) 09:30:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600032e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:01 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000060000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:01 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c000000110afff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004003f300030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:01 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000070000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:01 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c000000110bfff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x8000000}}, 0x28}}, 0x0) 09:30:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600042e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004003f400030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2073.389542][T16231] loop4: detected capacity change from 0 to 545 [ 2073.405462][T16233] tc_dump_action: action bad kind [ 2073.411122][T16231] EXT4-fs (loop4): bad geometry: block count 15926080 exceeds size of device (68 blocks) 09:30:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600052e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2073.506383][T16247] tc_dump_action: action bad kind [ 2073.520839][T16256] loop4: detected capacity change from 0 to 545 [ 2073.531294][T16256] EXT4-fs (loop4): bad geometry: block count 15991616 exceeds size of device (68 blocks) 09:30:01 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff888141ab6418, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:01 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000080000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:01 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c000000110cfff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x9000000}}, 0x28}}, 0x0) 09:30:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600062e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004003f500030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0xa000000}}, 0x28}}, 0x0) 09:30:02 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c000000110dfff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2074.319426][T16270] tc_dump_action: action bad kind [ 2074.333024][T16274] selinux_netlink_send: 2 callbacks suppressed [ 2074.333043][T16274] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3089 sclass=netlink_route_socket pid=16274 comm=syz-executor.0 [ 2074.346136][T16279] __nla_validate_parse: 4 callbacks suppressed [ 2074.346151][T16279] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 09:30:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600072e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:02 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000090000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2074.388678][T16280] loop4: detected capacity change from 0 to 545 [ 2074.399317][T16280] EXT4-fs (loop4): bad geometry: block count 16057152 exceeds size of device (68 blocks) [ 2074.416711][T16287] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3345 sclass=netlink_route_socket pid=16287 comm=syz-executor.0 09:30:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040fffe00030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0xb000000}}, 0x28}}, 0x0) [ 2074.448610][T16288] tc_dump_action: action bad kind [ 2074.500500][T16296] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2074.509868][T16300] tc_dump_action: action bad kind [ 2074.523788][T16301] loop4: detected capacity change from 0 to 545 [ 2074.548223][T16301] EXT4-fs (loop4): bad geometry: block count 16711488 exceeds size of device (68 blocks) 09:30:02 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff888141ad8c18, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600082e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:02 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c000000110efff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:02 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000a0000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0xc000000}}, 0x28}}, 0x0) 09:30:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000400fff00030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2075.262878][T16315] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2075.274384][T16317] tc_dump_action: action bad kind [ 2075.288264][T16320] loop4: detected capacity change from 0 to 545 [ 2075.293070][T16323] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3601 sclass=netlink_route_socket pid=16323 comm=syz-executor.0 09:30:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0xd000000}}, 0x28}}, 0x0) 09:30:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600092e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:03 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000b0000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:03 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001110fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2075.303157][T16320] EXT4-fs (loop4): bad geometry: block count 16715584 exceeds size of device (68 blocks) 09:30:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06000a2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2075.376128][T16331] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2075.403750][T16335] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4113 sclass=netlink_route_socket pid=16335 comm=syz-executor.0 09:30:03 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000c0000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2075.422889][T16337] tc_dump_action: action bad kind [ 2075.459876][T16344] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 09:30:03 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff888141ad8c98, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040feff00030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06000b2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0xe000000}}, 0x28}}, 0x0) 09:30:03 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001111fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:03 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000d0000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06000c2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x10000000}}, 0x28}}, 0x0) [ 2076.219139][T16355] loop4: detected capacity change from 0 to 545 [ 2076.224809][T16358] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2076.235518][T16359] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4369 sclass=netlink_route_socket pid=16359 comm=syz-executor.0 [ 2076.248869][T16355] EXT4-fs (loop4): bad geometry: block count 16776768 exceeds size of device (68 blocks) [ 2076.251376][T16360] tc_dump_action: action bad kind 09:30:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06000d2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:03 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000e0000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:04 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001112fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000000040000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2076.341940][T16373] tc_dump_action: action bad kind [ 2076.349967][T16375] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2076.371631][T16379] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4625 sclass=netlink_route_socket pid=16379 comm=syz-executor.0 [ 2076.406077][T16381] loop4: detected capacity change from 0 to 545 [ 2076.414929][T16381] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2076.424806][T16381] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2076.434604][T16381] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2076.452113][T16381] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2076.464355][T16381] EXT4-fs (loop4): get root inode failed [ 2076.469989][T16381] EXT4-fs (loop4): mount failed 09:30:04 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff888141b1d998, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06000e2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x11000000}}, 0x28}}, 0x0) 09:30:04 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000100000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:04 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001125fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000000050000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2077.149238][T16399] validate_nla: 49 callbacks suppressed [ 2077.149250][T16399] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2077.158876][T16402] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=9489 sclass=netlink_route_socket pid=16402 comm=syz-executor.0 [ 2077.163085][T16399] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 09:30:04 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001148fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x12000000}}, 0x28}}, 0x0) [ 2077.192651][T16400] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2077.201834][T16403] tc_dump_action: action bad kind [ 2077.207460][T16400] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2077.216643][T16400] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2077.225283][T16404] loop4: detected capacity change from 0 to 545 09:30:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06000f2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2077.246960][T16404] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2077.256796][T16404] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2077.266705][T16404] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2077.285767][T16411] tc_dump_action: action bad kind 09:30:04 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000110000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x14000000}}, 0x28}}, 0x0) [ 2077.294534][T16412] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=18449 sclass=netlink_route_socket pid=16412 comm=syz-executor.0 [ 2077.316032][T16414] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2077.343498][T16416] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2077.351725][T16416] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2077.361351][T16414] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2077.384261][T16414] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:30:05 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000120000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2077.392534][T16419] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2077.400636][T16418] tc_dump_action: action bad kind [ 2077.405741][T16404] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2077.417765][T16404] EXT4-fs (loop4): get root inode failed [ 2077.423434][T16404] EXT4-fs (loop4): mount failed [ 2077.445747][T16422] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2077.454017][T16422] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 09:30:05 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff888141b62d18, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:05 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c000000114cfff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600102e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x20000000}}, 0x28}}, 0x0) 09:30:05 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000250000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000000060000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x25000000}}, 0x28}}, 0x0) 09:30:05 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000480000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2078.085481][T16437] tc_dump_action: action bad kind [ 2078.091317][T16440] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=19473 sclass=netlink_route_socket pid=16440 comm=syz-executor.0 [ 2078.105537][T16439] loop4: detected capacity change from 0 to 545 09:30:05 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001160fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:05 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001168fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600112e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2078.130477][T16439] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2078.140660][T16439] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2078.149605][T16449] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=24593 sclass=netlink_route_socket pid=16449 comm=syz-executor.0 [ 2078.150418][T16439] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 09:30:05 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c000000116cfff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2078.207596][T16452] tc_dump_action: action bad kind [ 2078.217096][T16439] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2078.229573][T16439] EXT4-fs (loop4): get root inode failed [ 2078.235351][T16439] EXT4-fs (loop4): mount failed 09:30:06 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff888141c53218, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:06 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080004c0000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600122e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x48000000}}, 0x28}}, 0x0) 09:30:06 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001174fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000000070000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600132e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2079.000024][T16476] tc_dump_action: action bad kind [ 2079.009598][T16477] loop4: detected capacity change from 0 to 545 [ 2079.033839][T16477] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 09:30:06 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c000000117afff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:06 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000600000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x4c000000}}, 0x28}}, 0x0) [ 2079.043660][T16477] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2079.053550][T16477] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 09:30:06 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000680000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:06 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd950a76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2079.114328][T16492] tc_dump_action: action bad kind [ 2079.190027][T16477] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2079.202266][T16477] EXT4-fs (loop4): get root inode failed [ 2079.207889][T16477] EXT4-fs (loop4): mount failed 09:30:07 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff888141c53598, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600142e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x60000000}}, 0x28}}, 0x0) 09:30:07 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd952576c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:07 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080006c0000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000000080000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2079.901393][T16511] __nla_validate_parse: 6 callbacks suppressed [ 2079.901408][T16511] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2079.923648][T16515] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2079.933596][T16517] tc_dump_action: action bad kind 09:30:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x68000000}}, 0x28}}, 0x0) 09:30:07 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000740000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2079.947863][T16516] loop4: detected capacity change from 0 to 545 09:30:07 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f0ac9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600152e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2079.975768][T16516] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2079.985814][T16516] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2079.995565][T16516] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2080.005410][T16525] tc_dump_action: action bad kind 09:30:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x6c000000}}, 0x28}}, 0x0) [ 2080.017917][T16526] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 09:30:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600162e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2080.064024][T16532] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2080.082461][T16533] tc_dump_action: action bad kind [ 2080.124498][T16516] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2080.136612][T16516] EXT4-fs (loop4): get root inode failed [ 2080.142615][T16516] EXT4-fs (loop4): mount failed 09:30:08 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff888141c53618, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:08 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080007a0000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x74000000}}, 0x28}}, 0x0) 09:30:08 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f25c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600172e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000000090000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2080.798284][T16547] loop4: detected capacity change from 0 to 545 [ 2080.804655][T16550] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2080.816500][T16547] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2080.826397][T16547] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2080.836255][T16547] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 09:30:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x7a000000}}, 0x28}}, 0x0) [ 2080.849296][T16547] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2080.849492][T16558] tc_dump_action: action bad kind [ 2080.861360][T16547] EXT4-fs (loop4): get root inode failed [ 2080.872063][T16547] EXT4-fs (loop4): mount failed 09:30:08 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000300000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:08 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b704a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600182e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:08 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000500000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x81000000}}, 0x28}}, 0x0) [ 2080.895043][T16562] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2080.917732][T16565] tc_dump_action: action bad kind [ 2080.932472][T16567] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2080.977481][T16568] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2081.006924][T16576] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2081.021812][T16578] tc_dump_action: action bad kind 09:30:09 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff888141c53698, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000400000000a0000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:09 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b72ca6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600192e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x81ffffff}}, 0x28}}, 0x0) 09:30:09 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000600000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06001a2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2081.823587][T16594] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2081.838673][T16596] tc_dump_action: action bad kind [ 2081.855795][T16599] loop4: detected capacity change from 0 to 545 09:30:09 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000700000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x9effffff}}, 0x28}}, 0x0) [ 2081.866386][T16599] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2081.876999][T16599] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2081.886844][T16599] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2081.912210][T16599] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated 09:30:09 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6028000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06001b2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:09 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000900000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2081.924308][T16599] EXT4-fs (loop4): get root inode failed [ 2081.927767][T16609] tc_dump_action: action bad kind [ 2081.930042][T16599] EXT4-fs (loop4): mount failed 09:30:10 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff888141c53818, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:10 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000a00000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0xc00e0000}}, 0x28}}, 0x0) 09:30:10 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6038000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06001c2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000400000000b0000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2082.771102][T16635] tc_dump_action: action bad kind [ 2082.777594][T16637] validate_nla: 56 callbacks suppressed [ 2082.777607][T16637] netlink: 'syz-executor.0': attribute type 27 has an invalid length. 09:30:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0xeaffffff}}, 0x28}}, 0x0) [ 2082.812105][T16640] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2082.816234][T16639] loop4: detected capacity change from 0 to 545 [ 2082.826883][T16642] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2082.844430][T16640] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:30:10 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6048000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:10 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000b00000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2082.854631][T16639] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2082.856589][T16646] tc_dump_action: action bad kind [ 2082.864436][T16639] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2082.877707][T16640] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2082.879190][T16639] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 09:30:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0xefffffff}}, 0x28}}, 0x0) 09:30:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06001d2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2082.910609][T16639] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2082.922867][T16639] EXT4-fs (loop4): get root inode failed [ 2082.929281][T16639] EXT4-fs (loop4): mount failed [ 2082.946231][T16651] netlink: 'syz-executor.0': attribute type 27 has an invalid length. 09:30:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0xf0ffffff}}, 0x28}}, 0x0) [ 2082.961748][T16653] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2082.977029][T16654] tc_dump_action: action bad kind [ 2082.995480][T16656] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2083.035253][T16656] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2083.046094][T16656] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2083.054938][T16659] tc_dump_action: action bad kind 09:30:11 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff888141c53998, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:11 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000c00000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:11 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6058000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06001e2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0xfeffffff}}, 0x28}}, 0x0) 09:30:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000400000000c0000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06001f2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:11 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6068000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2083.689067][T16682] tc_dump_action: action bad kind [ 2083.690131][T16680] loop4: detected capacity change from 0 to 545 [ 2083.723590][T16680] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 09:30:11 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6078000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:11 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000d00000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0xff5c0000}}, 0x28}}, 0x0) 09:30:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600202e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2083.734018][T16680] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2083.743882][T16680] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2083.779333][T16696] tc_dump_action: action bad kind [ 2083.828604][T16680] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2083.840760][T16680] EXT4-fs (loop4): get root inode failed [ 2083.846463][T16680] EXT4-fs (loop4): mount failed 09:30:12 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff888141c53b18, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:12 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000e00000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:12 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6088000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600212e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0xffffff7f}}, 0x28}}, 0x0) 09:30:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000400000000d0000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0xffffff81}}, 0x28}}, 0x0) 09:30:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600222e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2084.583530][T16716] tc_dump_action: action bad kind 09:30:12 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6098000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2084.624804][T16722] loop4: detected capacity change from 0 to 545 [ 2084.633262][T16722] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2084.634573][T16725] tc_dump_action: action bad kind [ 2084.644368][T16722] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2084.644407][T16722] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 09:30:12 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000001100000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600232e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0xffffff9e}}, 0x28}}, 0x0) [ 2084.681912][T16722] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2084.695110][T16722] EXT4-fs (loop4): get root inode failed [ 2084.700746][T16722] EXT4-fs (loop4): mount failed [ 2084.735862][T16739] tc_dump_action: action bad kind 09:30:13 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff888141ee8018, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:13 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60a8000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0xffffffea}}, 0x28}}, 0x0) 09:30:13 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000001200000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600242e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000400000000e0000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600252e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2085.499909][T16752] __nla_validate_parse: 17 callbacks suppressed [ 2085.499972][T16752] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2085.515607][T16758] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2085.526590][T16756] loop4: detected capacity change from 0 to 545 [ 2085.538141][T16760] tc_dump_action: action bad kind 09:30:13 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60b8000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2085.550832][T16756] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2085.560904][T16756] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2085.571352][T16756] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 09:30:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0xffffffef}}, 0x28}}, 0x0) 09:30:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600262e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:13 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000002000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:13 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60c8000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2085.593159][T16756] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2085.605308][T16756] EXT4-fs (loop4): get root inode failed [ 2085.610949][T16756] EXT4-fs (loop4): mount failed [ 2085.627635][T16769] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2085.641489][T16772] tc_dump_action: action bad kind [ 2085.678136][T16779] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2085.703932][T16781] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 09:30:14 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff888141ee8618, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0xfffffff0}}, 0x28}}, 0x0) 09:30:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000400000000f0000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600272e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:14 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000002500000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:14 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60d8000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2086.394634][T16792] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2086.415692][T16796] loop4: detected capacity change from 0 to 545 [ 2086.418962][T16800] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2086.434068][T16797] tc_dump_action: action bad kind 09:30:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600282e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0xfffffffe}}, 0x28}}, 0x0) 09:30:14 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60e8000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2086.441656][T16796] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2086.451801][T16796] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2086.461701][T16796] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 09:30:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600292e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:14 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080004b4600000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2086.492145][T16796] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2086.504497][T16796] EXT4-fs (loop4): get root inode failed [ 2086.510202][T16796] EXT4-fs (loop4): mount failed [ 2086.516163][T16805] tc_dump_action: action bad kind 09:30:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}}, 0x0) [ 2086.561522][T16813] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2086.582878][T16815] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2086.592239][T16817] tc_dump_action: action bad kind 09:30:14 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff888142087b18, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06002a2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:14 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6108000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x2}}}, 0x28}}, 0x0) 09:30:14 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000004800000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000000100000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:15 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000464b00000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:15 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6118000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2087.330779][T16832] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2087.344641][T16836] tc_dump_action: action bad kind [ 2087.357758][T16837] loop4: detected capacity change from 0 to 545 09:30:15 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6128000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06002b2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x3}}}, 0x28}}, 0x0) [ 2087.393132][T16837] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2087.403750][T16837] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2087.413529][T16837] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 09:30:15 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000004c00000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2087.470706][T16853] tc_dump_action: action bad kind [ 2087.520834][T16837] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2087.532938][T16837] EXT4-fs (loop4): get root inode failed [ 2087.538573][T16837] EXT4-fs (loop4): mount failed 09:30:15 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff888142087f18, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06002c2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:15 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6258000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x4}}}, 0x28}}, 0x0) 09:30:15 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000006000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000001100000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2088.247468][T16869] loop4: detected capacity change from 0 to 545 [ 2088.253415][T16875] tc_dump_action: action bad kind [ 2088.260664][T16874] validate_nla: 67 callbacks suppressed [ 2088.261968][T16869] EXT4-fs (loop4): bad geometry: block count 16777280 exceeds size of device (68 blocks) [ 2088.266355][T16874] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2088.285980][T16877] netlink: 'syz-executor.3': attribute type 27 has an invalid length. 09:30:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x5}}}, 0x28}}, 0x0) [ 2088.296409][T16880] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2088.308969][T16880] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:30:16 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000006800000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000000110000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:16 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6488000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06002d2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2088.343364][T16880] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:30:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x6}}}, 0x28}}, 0x0) [ 2088.409225][T16887] tc_dump_action: action bad kind [ 2088.419975][T16888] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2088.429108][T16893] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2088.430912][T16894] loop4: detected capacity change from 0 to 545 [ 2088.438221][T16896] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2088.470171][T16893] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2088.486977][T16894] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2088.497146][T16894] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2088.497632][T16898] tc_dump_action: action bad kind [ 2088.507196][T16894] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2088.524416][T16893] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2088.552286][T16894] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2088.564437][T16894] EXT4-fs (loop4): get root inode failed [ 2088.570071][T16894] EXT4-fs (loop4): mount failed 09:30:16 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff888142087f98, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:16 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000006c00000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x7}}}, 0x28}}, 0x0) 09:30:16 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a64c8000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06002e2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000000120000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:16 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6608000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x8}}}, 0x28}}, 0x0) 09:30:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06002f2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:16 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000007400000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2089.182275][T16919] loop4: detected capacity change from 0 to 545 [ 2089.192516][T16922] tc_dump_action: action bad kind [ 2089.198712][T16919] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2089.208515][T16919] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2089.218273][T16919] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 09:30:16 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000007a00000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:16 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6688000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2089.272353][T16919] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2089.284455][T16919] EXT4-fs (loop4): get root inode failed [ 2089.285901][T16931] tc_dump_action: action bad kind [ 2089.290195][T16919] EXT4-fs (loop4): mount failed 09:30:17 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff88814284e818, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:17 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000004003000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x9}}}, 0x28}}, 0x0) 09:30:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600302e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:17 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a66c8000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000400000001a0000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:17 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000340000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600312e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:17 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6748000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2090.089413][T16957] loop4: detected capacity change from 0 to 545 [ 2090.098383][T16959] tc_dump_action: action bad kind [ 2090.113059][T16957] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2090.122878][T16957] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 09:30:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0xa}}}, 0x28}}, 0x0) [ 2090.132637][T16957] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 09:30:17 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000400ad000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0xb}}}, 0x28}}, 0x0) [ 2090.168857][T16973] tc_dump_action: action bad kind [ 2090.181192][T16957] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2090.193370][T16957] EXT4-fs (loop4): get root inode failed [ 2090.199030][T16957] EXT4-fs (loop4): mount failed [ 2090.226365][T16979] tc_dump_action: action bad kind 09:30:18 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff88814291be18, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600322e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:18 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a67a8000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0xc}}}, 0x28}}, 0x0) 09:30:18 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000010000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000000200000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2091.014913][T16996] __nla_validate_parse: 20 callbacks suppressed [ 2091.015005][T16996] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2091.033956][T16995] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2091.035552][T17000] loop4: detected capacity change from 0 to 545 [ 2091.044552][T16997] tc_dump_action: action bad kind 09:30:18 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000020000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600332e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2091.058535][T17000] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2091.068385][T17000] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2091.078124][T17000] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 09:30:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0xd}}}, 0x28}}, 0x0) 09:30:18 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6000000001900000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0xe}}}, 0x28}}, 0x0) [ 2091.103790][T17000] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2091.115858][T17000] EXT4-fs (loop4): get root inode failed [ 2091.121524][T17000] EXT4-fs (loop4): mount failed [ 2091.129867][T17008] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2091.152343][T17012] tc_dump_action: action bad kind 09:30:18 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000030000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2091.174481][T17014] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2091.218627][T17017] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2091.236414][T17018] tc_dump_action: action bad kind 09:30:19 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff888142b31818, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600342e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:19 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000004003440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000400000002e0000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x10}}}, 0x28}}, 0x0) 09:30:19 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000040000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:19 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008002000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2091.947258][T17037] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2091.956745][T17038] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2091.969174][T17040] loop4: detected capacity change from 0 to 545 [ 2091.973374][T17036] tc_dump_action: action bad kind [ 2091.985295][T17040] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2091.995449][T17040] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2092.006406][T17040] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2092.020645][T17048] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2092.034754][T17040] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated 09:30:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x11}}}, 0x28}}, 0x0) 09:30:19 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000ad00040000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600352e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:19 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008003000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2092.047901][T17040] EXT4-fs (loop4): get root inode failed [ 2092.053563][T17040] EXT4-fs (loop4): mount failed 09:30:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600362e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2092.098100][T17053] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2092.108596][T17055] tc_dump_action: action bad kind [ 2092.130705][T17056] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 09:30:20 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff888142b31a18, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000400000003f0000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:20 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008004000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x12}}}, 0x28}}, 0x0) 09:30:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600372e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:20 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000050000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600382e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:20 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000060000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:20 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008005000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2092.887525][T17081] tc_dump_action: action bad kind [ 2092.896514][T17076] loop4: detected capacity change from 0 to 545 [ 2092.923060][T17076] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 09:30:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x14}}}, 0x28}}, 0x0) 09:30:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600392e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2092.932914][T17076] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2092.944490][T17076] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2092.972325][T17076] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated 09:30:20 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008006000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2092.984424][T17076] EXT4-fs (loop4): get root inode failed [ 2092.990057][T17076] EXT4-fs (loop4): mount failed [ 2093.018868][T17098] tc_dump_action: action bad kind 09:30:21 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff888142b4b118, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:21 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000070000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:21 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008007000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06003a2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x25}}}, 0x28}}, 0x0) 09:30:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000000400000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2093.807085][T17114] validate_nla: 63 callbacks suppressed [ 2093.807139][T17114] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2093.822612][T17117] tc_dump_action: action bad kind [ 2093.826308][T17119] loop4: detected capacity change from 0 to 545 [ 2093.827740][T17115] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2093.843583][T17119] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 09:30:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x48}}}, 0x28}}, 0x0) 09:30:21 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000080000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2093.843921][T17116] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2093.853385][T17119] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2093.871176][T17119] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2093.895799][T17119] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated 09:30:21 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008008000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2093.907882][T17119] EXT4-fs (loop4): get root inode failed [ 2093.913570][T17119] EXT4-fs (loop4): mount failed [ 2093.920821][T17116] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2093.947423][T17127] tc_dump_action: action bad kind 09:30:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06003b2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2093.952762][T17129] netlink: 'syz-executor.3': attribute type 27 has an invalid length. 09:30:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x4c}}}, 0x28}}, 0x0) 09:30:21 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000090000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2093.982840][T17130] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2094.027415][T17135] tc_dump_action: action bad kind [ 2094.032896][T17132] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2094.066577][T17132] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2094.074864][T17140] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2094.088435][T17132] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:30:22 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff888142b4bb98, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:22 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008009000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x60}}}, 0x28}}, 0x0) 09:30:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000000480000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:22 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000000a0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06003c2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:22 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000000b0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06003d2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2094.749253][T17156] tc_dump_action: action bad kind [ 2094.758241][T17153] loop4: detected capacity change from 0 to 545 [ 2094.786583][T17153] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 09:30:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x68}}}, 0x28}}, 0x0) [ 2094.796392][T17153] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2094.806144][T17153] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2094.836451][T17153] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated 09:30:22 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800a000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:22 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000000c0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06003e2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2094.848822][T17153] EXT4-fs (loop4): get root inode failed [ 2094.855028][T17153] EXT4-fs (loop4): mount failed [ 2094.863836][T17170] tc_dump_action: action bad kind 09:30:23 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff888142b58998, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x6c}}}, 0x28}}, 0x0) 09:30:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06003f2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:23 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800b000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:23 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000000d0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000000490000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:23 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800c000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2095.687330][T17194] loop4: detected capacity change from 0 to 545 [ 2095.703186][T17199] tc_dump_action: action bad kind [ 2095.725890][T17194] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 09:30:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600402e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:23 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000000e0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x74}}}, 0x28}}, 0x0) 09:30:23 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000100000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2095.735759][T17194] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2095.745495][T17194] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 09:30:23 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800d000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2095.840276][T17194] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2095.852988][T17194] EXT4-fs (loop4): get root inode failed [ 2095.857660][T17214] tc_dump_action: action bad kind [ 2095.860751][T17194] EXT4-fs (loop4): mount failed 09:30:24 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff888142b58b18, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600412e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:24 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000110000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:24 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800e000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x7a}}}, 0x28}}, 0x0) 09:30:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000000560000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600422e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2096.641000][T17232] __nla_validate_parse: 23 callbacks suppressed [ 2096.641016][T17232] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2096.661622][T17237] loop4: detected capacity change from 0 to 545 [ 2096.673648][T17237] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 09:30:24 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000120000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2096.683454][T17237] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2096.693332][T17237] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2096.703466][T17236] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2096.713747][T17234] tc_dump_action: action bad kind 09:30:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}}, 0x0) 09:30:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600432e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:24 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008010000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2096.733024][T17246] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2096.742583][T17237] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2096.754641][T17237] EXT4-fs (loop4): get root inode failed [ 2096.760317][T17237] EXT4-fs (loop4): mount failed [ 2096.794644][T17250] tc_dump_action: action bad kind 09:30:24 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000200000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2096.827355][T17252] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2096.870415][T17254] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 09:30:25 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff888142b58b98, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600442e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x0, 0x2}}}, 0x28}}, 0x0) 09:30:25 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008011000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:25 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000250000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040fffffffe0000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600452e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:25 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000004b460000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2097.586712][T17271] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2097.596282][T17268] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2097.611676][T17273] loop4: detected capacity change from 0 to 545 [ 2097.619110][T17272] tc_dump_action: action bad kind 09:30:25 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008012000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x0, 0x3}}}, 0x28}}, 0x0) 09:30:25 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008025000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600462e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2097.642551][T17273] EXT4-fs (loop4): bad geometry: block count 4294967104 exceeds size of device (68 blocks) [ 2097.661500][T17282] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2097.680991][T17285] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2097.719336][T17287] tc_dump_action: action bad kind [ 2097.742962][T17289] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 09:30:26 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff888142b58f18, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:26 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000480000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x0, 0x4}}}, 0x28}}, 0x0) 09:30:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600472e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:26 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008048000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000003ff0000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600482e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:26 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000004c0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2098.543595][T17310] tc_dump_action: action bad kind [ 2098.560281][T17308] loop4: detected capacity change from 0 to 545 09:30:26 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600804c000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x0, 0x5}}}, 0x28}}, 0x0) 09:30:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600492e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:26 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008060000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2098.586042][T17308] EXT4-fs (loop4): bad geometry: block count 50331712 exceeds size of device (68 blocks) [ 2098.656814][T17326] tc_dump_action: action bad kind 09:30:27 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff88814489bb18, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000407fffffff0000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:27 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000600000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x0, 0x6}}}, 0x28}}, 0x0) 09:30:27 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008068000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06004a2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2099.480678][T17343] loop4: detected capacity change from 0 to 545 [ 2099.480801][T17342] validate_nla: 71 callbacks suppressed [ 2099.480811][T17342] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2099.501881][T17346] tc_dump_action: action bad kind [ 2099.506988][T17342] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2099.510299][T17343] EXT4-fs (loop4): bad geometry: block count 4294934336 exceeds size of device (68 blocks) 09:30:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000800000000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x0, 0x7}}}, 0x28}}, 0x0) 09:30:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06004b2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:27 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000680000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2099.518319][T17347] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2099.535868][T17348] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2099.546940][T17342] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:30:27 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600806c000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2099.606835][T17357] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2099.639986][T17357] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:30:27 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000006c0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2099.648999][T17360] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2099.658249][T17361] loop4: detected capacity change from 0 to 545 [ 2099.664974][T17359] tc_dump_action: action bad kind [ 2099.670588][T17357] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2099.701944][T17369] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2099.702682][T17361] EXT4-fs (loop4): bad geometry: block count 524352 exceeds size of device (68 blocks) 09:30:28 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff8881448f4618, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:28 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000740000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x0, 0x8}}}, 0x28}}, 0x0) 09:30:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06004c2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:28 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008074000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000200030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:28 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000007a0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:28 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600807a000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06004d2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2100.440242][T17389] loop4: detected capacity change from 0 to 545 [ 2100.445202][T17390] tc_dump_action: action bad kind [ 2100.455101][T17389] EXT4-fs (loop4): bad geometry: block count 131136 exceeds size of device (68 blocks) 09:30:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06004e2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x0, 0x9}}}, 0x28}}, 0x0) 09:30:28 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000ffffff9e0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2100.570222][T17410] tc_dump_action: action bad kind 09:30:29 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffff8881448f4b18, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000300030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:29 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000030000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:29 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000ffffffc30000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x0, 0xa}}}, 0x28}}, 0x0) 09:30:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06004f2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2101.359938][T17421] tc_dump_action: action bad kind 09:30:29 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000ffffffea0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:29 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000050000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x0, 0xb}}}, 0x28}}, 0x0) 09:30:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600502e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2101.403073][T17427] loop4: detected capacity change from 0 to 545 [ 2101.439491][T17427] EXT4-fs (loop4): bad geometry: block count 196672 exceeds size of device (68 blocks) [ 2101.460038][T17438] tc_dump_action: action bad kind 09:30:29 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000060000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x0, 0xc}}}, 0x28}}, 0x0) [ 2101.539399][T17445] tc_dump_action: action bad kind 09:30:29 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffffc90000000000, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600512e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:29 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000ffffffef0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x0, 0xd}}}, 0x28}}, 0x0) 09:30:29 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000070000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000400030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600522e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2102.275952][T17461] loop4: detected capacity change from 0 to 545 [ 2102.291374][T17461] EXT4-fs (loop4): bad geometry: block count 262208 exceeds size of device (68 blocks) [ 2102.307338][T17468] __nla_validate_parse: 20 callbacks suppressed [ 2102.307356][T17468] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 09:30:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000500030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600532e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2102.335200][T17470] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2102.347120][T17471] tc_dump_action: action bad kind 09:30:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x0, 0xe}}}, 0x28}}, 0x0) 09:30:30 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000fffffff00000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:30 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000090000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2102.435512][T17479] loop4: detected capacity change from 0 to 545 [ 2102.463680][T17479] EXT4-fs (loop4): bad geometry: block count 327744 exceeds size of device (68 blocks) [ 2102.487287][T17489] tc_dump_action: action bad kind [ 2102.496766][T17490] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2102.514005][T17491] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 09:30:30 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000240)="020182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600542e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x0, 0x10}}}, 0x28}}, 0x0) 09:30:30 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080000a0000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:30 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000fffffffc0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000600030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600552e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:30 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000fffffffe0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2103.202885][T17508] tc_dump_action: action bad kind [ 2103.208039][T17510] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2103.217295][T17511] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2103.236187][T17513] loop4: detected capacity change from 0 to 545 09:30:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x0, 0x11}}}, 0x28}}, 0x0) 09:30:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x0, 0x12}}}, 0x28}}, 0x0) 09:30:30 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080000b0000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2103.256597][T17513] EXT4-fs (loop4): bad geometry: block count 393280 exceeds size of device (68 blocks) [ 2103.278769][T17520] tc_dump_action: action bad kind [ 2103.285990][T17521] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 09:30:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600562e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2103.310209][T17524] tc_dump_action: action bad kind [ 2103.343471][T17527] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 09:30:31 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="030182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x0, 0x14}}}, 0x28}}, 0x0) 09:30:31 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080007fffffff0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000700030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600572e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:31 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080000c0000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x0, 0x25}}}, 0x28}}, 0x0) [ 2104.119601][T17539] tc_dump_action: action bad kind [ 2104.136291][T17542] loop4: detected capacity change from 0 to 545 [ 2104.146990][T17547] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2104.156301][T17542] EXT4-fs (loop4): bad geometry: block count 458816 exceeds size of device (68 blocks) 09:30:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600582e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000800030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:31 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080000d0000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x0, 0x48}}}, 0x28}}, 0x0) 09:30:31 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080009effffff0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2104.161250][T17549] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2104.179733][T17548] loop5: detected capacity change from 0 to 264192 [ 2104.196426][T17555] tc_dump_action: action bad kind [ 2104.235030][T17548] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2104.256857][T17548] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2104.268525][T17565] loop4: detected capacity change from 0 to 545 [ 2104.279458][T17548] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2104.280075][T17570] tc_dump_action: action bad kind [ 2104.292226][T17565] EXT4-fs (loop4): bad geometry: block count 524352 exceeds size of device (68 blocks) [ 2104.303993][T17548] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2104.312241][T17548] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:32 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="040182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:32 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600592e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:32 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080000e0000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000900030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:32 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000c3ffffff0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x0, 0x4c}}}, 0x28}}, 0x0) 09:30:32 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06005a2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x0, 0x60}}}, 0x28}}, 0x0) 09:30:32 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000110000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:32 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000eaffffff0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2104.436777][T17602] tc_dump_action: action bad kind [ 2104.453860][T17603] loop4: detected capacity change from 0 to 545 [ 2104.476691][T17594] loop5: detected capacity change from 0 to 264192 [ 2104.504390][T17618] validate_nla: 68 callbacks suppressed [ 2104.504404][T17618] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2104.504915][T17603] EXT4-fs (loop4): bad geometry: block count 589888 exceeds size of device (68 blocks) [ 2104.510429][T17618] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2104.538722][T17623] tc_dump_action: action bad kind [ 2104.542787][T17594] loop5: p1 p2 < > p3 p4 < p5 p6 > 09:30:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x0, 0x68}}}, 0x28}}, 0x0) [ 2104.547352][T17624] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2104.549189][T17594] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2104.560092][T17625] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2104.565186][T17594] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2104.581558][T17594] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2104.581957][T17618] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2104.589195][T17594] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000a00030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:32 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="070182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:32 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06005b2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:32 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000120000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:32 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000efffffff0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2104.694481][T17640] loop4: detected capacity change from 0 to 545 [ 2104.694606][T17638] tc_dump_action: action bad kind [ 2104.705985][T17640] EXT4-fs (loop4): bad geometry: block count 655424 exceeds size of device (68 blocks) 09:30:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x0, 0x6c}}}, 0x28}}, 0x0) [ 2104.749432][T17655] loop5: detected capacity change from 0 to 264192 [ 2104.751665][T17657] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2104.764529][T17659] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2104.772926][T17658] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2104.781148][T17657] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2104.794208][T17655] loop5: p1 p2 < > p3 p4 < p5 p6 > 09:30:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000b00030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:32 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000200000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2104.801720][T17655] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2104.819711][T17655] loop5: p3 size 1914664839 extends beyond EOD, truncated 09:30:32 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000f0ffffff0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2104.850421][T17670] tc_dump_action: action bad kind [ 2104.855547][T17673] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2104.867582][T17655] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2104.875994][T17672] loop4: detected capacity change from 0 to 545 [ 2104.883886][T17655] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:32 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06005c2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x0, 0x74}}}, 0x28}}, 0x0) 09:30:32 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000250000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:32 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000480000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2104.907634][T17672] EXT4-fs (loop4): bad geometry: block count 720960 exceeds size of device (68 blocks) [ 2104.973262][T17688] tc_dump_action: action bad kind 09:30:32 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="080182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:32 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080004c0000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:32 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000fcffffff0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x0, 0x7a}}}, 0x28}}, 0x0) 09:30:32 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06005d2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000c00030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:32 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080974c0000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2105.007172][T17655] loop5: detected capacity change from 0 to 264192 [ 2105.064654][T17711] tc_dump_action: action bad kind 09:30:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x25}}}, 0x28}}, 0x0) 09:30:32 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06005e2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:32 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000feffffff0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:32 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000600000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2105.089669][T17714] loop4: detected capacity change from 0 to 545 [ 2105.108157][T17714] EXT4-fs (loop4): bad geometry: block count 786496 exceeds size of device (68 blocks) 09:30:32 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000680000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2105.154052][T17726] tc_dump_action: action bad kind [ 2105.255921][T17740] loop5: detected capacity change from 0 to 264192 [ 2105.290160][T17740] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2105.295784][T17740] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2105.304259][T17740] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2105.312712][T17740] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2105.320657][T17740] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:33 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000200000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x74c}}}, 0x28}}, 0x0) 09:30:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06005f2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:33 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="090182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:33 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080006c0000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000d00030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:33 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000300000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:33 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000740000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600602e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2105.459864][T17766] tc_dump_action: action bad kind [ 2105.487757][T17768] loop4: detected capacity change from 0 to 545 09:30:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x1b3f}}}, 0x28}}, 0x0) 09:30:33 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000400000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:33 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080007a0000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600612e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2105.506459][T17770] loop5: detected capacity change from 0 to 264192 09:30:33 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000500000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:33 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600804c970000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2105.569952][T17770] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2105.580002][T17768] EXT4-fs (loop4): bad geometry: block count 852032 exceeds size of device (68 blocks) [ 2105.597525][T17770] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2105.602896][T17794] tc_dump_action: action bad kind [ 2105.622221][T17770] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2105.630794][T17770] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2105.649046][T17770] loop5: p6 size 1914664839 extends beyond EOD, truncated [ 2105.702167][T17770] loop5: detected capacity change from 0 to 264192 09:30:33 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0a0182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600622e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000e00030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:33 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000600000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:33 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000400300000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0xf}}, 0x0) 09:30:33 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000700000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2105.773944][T17770] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2105.779841][T17770] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2105.787849][T17770] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2105.796439][T17770] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2105.804230][T17770] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x10}}, 0x0) 09:30:33 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000034000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600632e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:33 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000800000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:33 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000001000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2105.936680][T17832] loop4: detected capacity change from 0 to 545 [ 2105.949991][T17832] EXT4-fs (loop4): bad geometry: block count 917568 exceeds size of device (68 blocks) [ 2105.967527][T17850] loop5: detected capacity change from 0 to 264192 [ 2106.025403][T17850] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2106.031367][T17850] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2106.041220][T17850] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2106.050737][T17850] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2106.058819][T17850] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:33 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0f0182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x14}}, 0x0) 09:30:33 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000002000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:33 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000900000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600642e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000f00030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2106.124165][T17850] loop5: detected capacity change from 0 to 264192 09:30:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x32}}, 0x0) 09:30:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600652e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:33 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000a00000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:33 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000003000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2106.200905][T17892] tc_dump_action: action bad kind 09:30:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600662e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:33 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000b00000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2106.260167][T17894] loop4: detected capacity change from 0 to 545 [ 2106.275645][T17905] loop5: detected capacity change from 0 to 264192 [ 2106.283408][T17907] tc_dump_action: action bad kind [ 2106.294384][T17894] EXT4-fs (loop4): bad geometry: block count 983104 exceeds size of device (68 blocks) 09:30:34 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="250182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0xc0}}, 0x0) 09:30:34 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000004000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:34 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600672e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:34 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000c00000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040001000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2106.341903][T17905] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2106.348044][T17905] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2106.356414][T17905] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2106.367740][T17905] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2106.375518][T17905] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0xec0}}, 0x0) [ 2106.447736][T17944] tc_dump_action: action bad kind [ 2106.448611][T17942] loop4: detected capacity change from 0 to 545 09:30:34 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000d00000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x33fe0}}, 0x0) 09:30:34 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600682e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040001100030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2106.489661][T17942] EXT4-fs (loop4): bad geometry: block count 1048640 exceeds size of device (68 blocks) [ 2106.516744][T17960] tc_dump_action: action bad kind 09:30:34 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000005000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2106.582787][T17959] loop5: detected capacity change from 0 to 264192 [ 2106.586076][T17970] tc_dump_action: action bad kind [ 2106.659954][T17959] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2106.665460][T17959] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2106.669916][T17978] loop4: detected capacity change from 0 to 545 [ 2106.674401][T17959] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2106.685202][T17978] EXT4-fs (loop4): bad geometry: block count 1114176 exceeds size of device (68 blocks) [ 2106.687492][T17959] loop5: p5 size 11290111 extends beyond EOD, truncated 09:30:34 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="260182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x200000a8}}, 0x0) 09:30:34 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000e00000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:34 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000006000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:34 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600692e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040001200030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2106.703711][T17959] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:34 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000007000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x7ffff000}}, 0x0) 09:30:34 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000001000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:34 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06006a2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2106.788904][T17999] loop4: detected capacity change from 0 to 545 [ 2106.813993][T17999] EXT4-fs (loop4): bad geometry: block count 1179712 exceeds size of device (68 blocks) 09:30:34 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000001100000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:34 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000008000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2106.870035][T18018] loop5: detected capacity change from 0 to 264192 [ 2106.924603][T18018] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2106.930278][T18018] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2106.938337][T18018] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2106.948603][T18018] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2106.957062][T18018] loop5: p6 size 1914664839 extends beyond EOD, truncated [ 2107.012307][T18018] loop5: detected capacity change from 0 to 264192 09:30:34 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="2f0182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0xfffffdef}}, 0x0) 09:30:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040002200030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:34 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06006b2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:34 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000009000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:34 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000001200000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x2}, 0x0) [ 2107.070027][T18018] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2107.075596][T18018] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2107.084251][T18018] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2107.092646][T18018] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2107.100655][T18018] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:34 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06006c2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:34 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000002500000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:34 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800000000a000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2107.190290][T18073] tc_dump_action: action bad kind [ 2107.201826][T18016] blk_update_request: I/O error, dev loop5, sector 263946 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 2107.202177][T18015] blk_update_request: I/O error, dev loop5, sector 25 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 2107.226773][T18014] blk_update_request: I/O error, dev loop5, sector 263945 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 2107.236180][ T968] blk_update_request: I/O error, dev loop5, sector 263946 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2107.240401][T17967] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 2107.250092][ T968] Buffer I/O error on dev loop5p1, logical block 131968, async page read [ 2107.263354][T18020] blk_update_request: I/O error, dev loop5, sector 263946 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 09:30:34 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000004800000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:34 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06006d2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2107.283926][T17975] blk_update_request: I/O error, dev loop5, sector 263945 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 2107.298339][T18071] loop4: detected capacity change from 0 to 545 [ 2107.300695][ T1772] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 2107.306432][ T968] blk_update_request: I/O error, dev loop5, sector 263948 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2107.324767][ T968] Buffer I/O error on dev loop5p1, logical block 131969, async page read [ 2107.333252][ T968] blk_update_request: I/O error, dev loop5, sector 263950 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2107.345004][ T968] Buffer I/O error on dev loop5p1, logical block 131970, async page read [ 2107.348942][T18088] __nla_validate_parse: 52 callbacks suppressed [ 2107.349011][T18088] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2107.353681][ T968] blk_update_request: I/O error, dev loop5, sector 263952 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2107.369795][T18071] EXT4-fs (loop4): bad geometry: block count 2228288 exceeds size of device (68 blocks) [ 2107.380931][ T968] Buffer I/O error on dev loop5p1, logical block 131971, async page read [ 2107.380979][ T968] Buffer I/O error on dev loop5p3, logical block 263936, async page read [ 2107.408403][ T968] Buffer I/O error on dev loop5p3, logical block 263937, async page read [ 2107.416910][ T968] Buffer I/O error on dev loop5p3, logical block 263938, async page read [ 2107.425379][ T968] Buffer I/O error on dev loop5p3, logical block 263939, async page read [ 2107.433902][ T968] Buffer I/O error on dev loop5p3, logical block 263940, async page read [ 2107.442356][ T968] Buffer I/O error on dev loop5p3, logical block 263941, async page read [ 2107.473777][T18092] loop5: detected capacity change from 0 to 264192 [ 2107.513918][T18092] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2107.519745][T18092] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2107.529061][T18092] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2107.538108][T18092] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2107.546090][T18092] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:35 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="310182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x8}, 0x0) 09:30:35 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800000000b000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06006e2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:35 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000004c00000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040002500030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:35 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800000000c000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x25}, 0x0) [ 2107.656307][T18138] tc_dump_action: action bad kind [ 2107.672545][T18144] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2107.673632][T18140] loop4: detected capacity change from 0 to 545 [ 2107.688504][T18141] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 09:30:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06006f2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:35 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000006000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:35 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800000000d000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2107.714331][T18139] loop5: detected capacity change from 0 to 264192 [ 2107.721500][T18157] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2107.739655][T18140] EXT4-fs (loop4): bad geometry: block count 2424896 exceeds size of device (68 blocks) 09:30:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600702e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2107.766115][T18162] tc_dump_action: action bad kind [ 2107.776242][T18139] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2107.782403][T18139] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2107.788631][T18167] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2107.793343][T18139] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2107.809483][T18164] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2107.828662][T18139] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2107.845824][T18139] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:35 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="3e0182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:35 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800000000e000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x300}, 0x0) 09:30:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040002e00030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:35 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000006800000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600712e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600722e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2107.970717][T18196] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2107.990810][T18197] loop4: detected capacity change from 0 to 545 [ 2107.996763][T18205] tc_dump_action: action bad kind [ 2108.004667][T18207] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2108.005745][T18206] loop5: detected capacity change from 0 to 264192 09:30:35 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000010000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x7ffffff2}, 0x0) 09:30:35 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000006c00000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:35 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000011000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2108.046102][T18224] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2108.061362][T18206] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2108.068581][T18206] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2108.081728][T18206] loop5: p3 size 1914664839 extends beyond EOD, truncated 09:30:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600732e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:35 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="640182ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:35 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000007400000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x7ffffff8}, 0x0) [ 2108.089988][T18206] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2108.097932][T18197] EXT4-fs (loop4): bad geometry: block count 3014720 exceeds size of device (68 blocks) [ 2108.098362][T18206] loop5: p6 size 1914664839 extends beyond EOD, truncated [ 2108.114093][T18229] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 09:30:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040004400030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:35 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000012000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600742e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x7ffffff9}, 0x0) 09:30:35 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000007a00000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:35 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000020000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2108.226309][T18243] loop5: detected capacity change from 0 to 264192 09:30:35 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000025000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x7ffffffe}, 0x0) 09:30:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600752e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2108.321390][T18243] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2108.328319][T18243] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2108.329014][T18272] loop4: detected capacity change from 0 to 545 [ 2108.349958][T18272] EXT4-fs (loop4): bad geometry: block count 4456512 exceeds size of device (68 blocks) [ 2108.371843][T18243] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2108.382804][T18243] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2108.390764][T18243] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:36 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="020282ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:36 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000003000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:36 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000048000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x2}, 0x0) 09:30:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600762e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040004800030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:36 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000005000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:36 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800000004c000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2108.530737][T18316] tc_dump_action: action bad kind [ 2108.540791][T18315] loop5: detected capacity change from 0 to 264192 [ 2108.552433][T18307] loop4: detected capacity change from 0 to 545 09:30:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600772e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600782e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x3}, 0x0) [ 2108.572106][T18307] EXT4-fs (loop4): bad geometry: block count 4718656 exceeds size of device (68 blocks) 09:30:36 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000060000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2108.630919][T18315] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2108.642046][T18315] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2108.661005][T18346] tc_dump_action: action bad kind [ 2108.667646][T18315] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2108.686388][T18315] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2108.694581][T18315] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:36 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="020382ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:36 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000006000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040004c00030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600792e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x4}, 0x0) 09:30:36 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000068000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:36 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000007000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:36 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800000006c000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06007a2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2108.874061][T18373] loop5: detected capacity change from 0 to 264192 [ 2108.889965][T18377] tc_dump_action: action bad kind [ 2108.900192][T18373] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2108.905883][T18373] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2108.915834][T18374] loop4: detected capacity change from 0 to 545 09:30:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x5}, 0x0) 09:30:36 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000009000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040006000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2108.927757][T18374] EXT4-fs (loop4): bad geometry: block count 4980800 exceeds size of device (68 blocks) [ 2108.963018][T18373] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2108.983513][T18393] tc_dump_action: action bad kind [ 2108.990240][T18373] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2109.008480][T18373] loop5: p6 size 1914664839 extends beyond EOD, truncated [ 2109.025347][T18402] loop4: detected capacity change from 0 to 545 09:30:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06007b2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:36 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000000a000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:36 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000074000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x6}, 0x0) 09:30:36 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="020482ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) [ 2109.044893][T18402] EXT4-fs (loop4): bad geometry: block count 6291520 exceeds size of device (68 blocks) 09:30:36 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800000007a000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06007c2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2109.089496][T18414] tc_dump_action: action bad kind 09:30:36 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000000b000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:36 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000004c97000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x7}, 0x0) 09:30:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040006800030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2109.117920][T18413] loop5: detected capacity change from 0 to 264192 09:30:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06007d2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:36 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080ffffff9e000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2109.164935][T18413] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2109.175844][T18413] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2109.213158][T18413] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2109.218195][T18446] tc_dump_action: action bad kind [ 2109.229368][T18445] loop4: detected capacity change from 0 to 545 [ 2109.232634][T18413] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2109.248821][T18413] loop5: p6 size 1914664839 extends beyond EOD, truncated [ 2109.272519][T18445] EXT4-fs (loop4): bad geometry: block count 6815808 exceeds size of device (68 blocks) [ 2109.289155][ T1033] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2109.295122][ T1033] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2109.304675][ T1033] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2109.312991][ T1033] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2109.320800][ T1033] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:37 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="020582ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:37 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000000c000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:37 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06007e2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x8}, 0x0) 09:30:37 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080ffffffea000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040006c00030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:37 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06007f2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:37 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000000d000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2109.483076][T18490] tc_dump_action: action bad kind [ 2109.502276][T18492] loop5: detected capacity change from 0 to 264192 [ 2109.505329][T18491] loop4: detected capacity change from 0 to 545 [ 2109.516253][T18493] validate_nla: 186 callbacks suppressed [ 2109.516263][T18493] netlink: 'syz-executor.0': attribute type 27 has an invalid length. 09:30:37 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080ffffffef000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x9}, 0x0) [ 2109.538115][T18498] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2109.546807][T18498] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2109.560243][T18501] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2109.569487][T18498] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2109.578259][T18492] loop5: p1 p2 < > p3 p4 < p5 p6 > 09:30:37 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080fffffff0000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:37 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000000e000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2109.583813][T18492] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2109.586967][T18491] EXT4-fs (loop4): bad geometry: block count 7077952 exceeds size of device (68 blocks) [ 2109.591402][T18503] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2109.621496][T18492] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2109.647806][T18492] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2109.649491][T18514] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2109.660533][T18492] loop5: p6 size 1914664839 extends beyond EOD, truncated [ 2109.663812][T18509] tc_dump_action: action bad kind [ 2109.694472][T18515] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2109.728264][T18492] loop5: detected capacity change from 0 to 264192 09:30:37 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="020682ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:37 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600802e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xa}, 0x0) 09:30:37 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000011000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040007400030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:37 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080fffffffe000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2109.781440][T18492] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2109.786890][T18492] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2109.795108][T18492] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2109.803457][T18492] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2109.811185][T18492] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:37 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600807fffffff000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xb}, 0x0) [ 2109.863483][T18544] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2109.872527][T18549] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2109.872621][T18546] loop4: detected capacity change from 0 to 545 [ 2109.890120][T18548] tc_dump_action: action bad kind 09:30:37 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000012000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:37 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600812e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:37 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600809effffff000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2109.908434][T18545] loop5: detected capacity change from 0 to 264192 09:30:37 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000020000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2109.950427][T18545] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2109.957230][T18546] EXT4-fs (loop4): bad geometry: block count 7602240 exceeds size of device (68 blocks) [ 2109.960878][T18545] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2109.976343][T18545] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2109.985134][T18545] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2109.993178][T18545] loop5: p6 size 1914664839 extends beyond EOD, truncated [ 2109.999671][T18575] tc_dump_action: action bad kind 09:30:37 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="020782ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:37 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600822e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xc}, 0x0) 09:30:37 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080eaffffff000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040007a00030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:37 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000025000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:37 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080efffffff000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:37 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600832e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xd}, 0x0) 09:30:37 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000004b46000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:37 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080f0ffffff000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2110.119095][T18603] loop5: detected capacity change from 0 to 264192 [ 2110.143104][T18607] tc_dump_action: action bad kind 09:30:37 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600842e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2110.180045][T18603] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2110.185841][T18603] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2110.191047][T18604] loop4: detected capacity change from 0 to 545 [ 2110.207317][T18604] EXT4-fs (loop4): bad geometry: block count 7995456 exceeds size of device (68 blocks) [ 2110.226167][T18622] tc_dump_action: action bad kind [ 2110.233870][T18603] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2110.249142][T18603] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2110.258382][T18603] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:37 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="020882ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:37 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000048000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xe}, 0x0) 09:30:37 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080feffffff000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004000fe00030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:37 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600852e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:38 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000464b000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:38 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000020000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:38 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000004c000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600862e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2110.406346][T18654] loop4: detected capacity change from 0 to 545 [ 2110.409265][T18653] tc_dump_action: action bad kind [ 2110.436580][T18654] EXT4-fs (loop4): bad geometry: block count 16646208 exceeds size of device (68 blocks) 09:30:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x10}, 0x0) 09:30:38 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000030000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2110.483389][T18660] loop5: detected capacity change from 0 to 264192 [ 2110.562494][T18660] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2110.572061][T18660] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2110.575324][T18677] tc_dump_action: action bad kind [ 2110.590814][T18660] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2110.601857][T18660] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2110.609781][T18660] loop5: p6 size 1914664839 extends beyond EOD, truncated [ 2110.713198][T18660] loop5: detected capacity change from 0 to 264192 09:30:38 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="020a82ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:38 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000060000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600872e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:38 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000040000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x11}, 0x0) 09:30:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040001001030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2110.759651][T18660] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2110.765222][T18660] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2110.773349][T18660] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2110.781687][T18660] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2110.789285][T18660] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x12}, 0x0) 09:30:38 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000068000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:38 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000050000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2110.826837][T18713] tc_dump_action: action bad kind 09:30:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600882e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:38 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000060000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2110.902544][T18716] loop4: detected capacity change from 0 to 545 [ 2110.933794][T18716] EXT4-fs (loop4): bad geometry: block count 17825856 exceeds size of device (68 blocks) 09:30:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000402030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2110.983794][T18740] tc_dump_action: action bad kind [ 2111.004691][T18742] loop5: detected capacity change from 0 to 264192 [ 2111.036944][T18749] loop4: detected capacity change from 0 to 545 [ 2111.048169][T18749] EXT4-fs (loop4): bad geometry: block count 33816640 exceeds size of device (68 blocks) [ 2111.072220][T18742] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2111.077809][T18742] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2111.086094][T18742] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2111.094044][T18742] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2111.103277][T18742] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:38 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="020f82ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:38 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000006c000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:38 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000070000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600892e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x14}, 0x0) 09:30:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040001902030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2111.254658][T18794] tc_dump_action: action bad kind 09:30:38 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000074000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06008a2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:38 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000080000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:39 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000090000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x25}, 0x0) 09:30:39 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000007a000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2111.287196][T18782] loop4: detected capacity change from 0 to 545 [ 2111.291653][T18797] loop5: detected capacity change from 0 to 264192 [ 2111.303090][T18782] EXT4-fs (loop4): bad geometry: block count 35192896 exceeds size of device (68 blocks) [ 2111.366719][T18797] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2111.378281][T18797] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2111.386444][T18812] tc_dump_action: action bad kind [ 2111.395490][T18797] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2111.425817][T18797] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2111.435622][T18797] loop5: p6 size 1914664839 extends beyond EOD, truncated [ 2111.501439][T18797] loop5: detected capacity change from 0 to 264192 09:30:39 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="021082ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:39 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080000a0000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06008b2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x48}, 0x0) 09:30:39 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000040030000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040002102030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2111.549555][T18797] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2111.554894][T18797] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2111.562784][T18797] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2111.571322][T18797] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2111.578726][T18797] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06008c2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:39 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080000b0000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x4c}, 0x0) 09:30:39 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000003400000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06008d2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2111.656396][T18860] tc_dump_action: action bad kind [ 2111.664908][T18856] loop5: detected capacity change from 0 to 264192 09:30:39 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080000c0000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2111.700115][T18856] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2111.708467][T18865] loop4: detected capacity change from 0 to 545 [ 2111.715608][T18856] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2111.731059][T18865] EXT4-fs (loop4): bad geometry: block count 35717184 exceeds size of device (68 blocks) [ 2111.745850][T18856] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2111.761114][T18880] tc_dump_action: action bad kind [ 2111.762176][T18856] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2111.798733][T18856] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:39 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="021d82ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x60}, 0x0) 09:30:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06008e2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:39 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000400ad0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040002702030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:39 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080000d0000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:39 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000100683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:39 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000200683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:39 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080000e0000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2111.929296][T18907] loop4: detected capacity change from 0 to 545 09:30:39 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000300683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2111.978894][T18907] EXT4-fs (loop4): bad geometry: block count 36110400 exceeds size of device (68 blocks) [ 2111.993518][T18921] tc_dump_action: action bad kind 09:30:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06008f2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x68}, 0x0) 09:30:39 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="022582ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:39 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000100000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000003030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:39 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000400683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:39 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000ad000400683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:39 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000110000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x6c}, 0x0) 09:30:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600902e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2112.161919][T18951] tc_dump_action: action bad kind [ 2112.171859][T18952] loop5: detected capacity change from 0 to 264192 [ 2112.214885][T18960] loop4: detected capacity change from 0 to 545 [ 2112.226760][T18960] EXT4-fs (loop4): bad geometry: block count 50331712 exceeds size of device (68 blocks) [ 2112.249953][T18952] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2112.255425][T18952] loop5: p1 size 11290111 extends beyond EOD, truncated 09:30:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x74}, 0x0) 09:30:39 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000120000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2112.264042][T18969] tc_dump_action: action bad kind 09:30:40 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000500683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040008403030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2112.304992][T18952] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2112.307708][T18981] tc_dump_action: action bad kind [ 2112.367437][T18952] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2112.373507][T18986] loop4: detected capacity change from 0 to 545 [ 2112.375896][T18952] loop5: p6 size 1914664839 extends beyond EOD, truncated [ 2112.388031][T18986] EXT4-fs (loop4): bad geometry: block count 58982464 exceeds size of device (68 blocks) 09:30:40 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="022c82ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:40 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000600683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x7a}, 0x0) 09:30:40 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000250000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600912e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2112.477415][T18999] __nla_validate_parse: 75 callbacks suppressed [ 2112.477432][T18999] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2112.493526][T18998] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2112.508168][T19000] tc_dump_action: action bad kind 09:30:40 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000700683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:40 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000480000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040008803030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x300}, 0x0) 09:30:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600922e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2112.601129][T19014] loop5: detected capacity change from 0 to 264192 [ 2112.629928][T19027] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2112.639834][T19026] loop4: detected capacity change from 0 to 545 09:30:40 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080004c0000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2112.651622][T19014] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2112.657085][T19014] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2112.665688][T19014] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2112.674515][T19014] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2112.680248][T19030] tc_dump_action: action bad kind [ 2112.682379][T19014] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600932e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:40 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="023e82ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) [ 2112.694968][T19026] EXT4-fs (loop4): bad geometry: block count 59244608 exceeds size of device (68 blocks) [ 2112.710502][T19021] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2112.727704][T19030] tc_dump_action: action bad kind 09:30:40 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000800683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600942e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x500}, 0x0) [ 2112.753980][T19039] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 09:30:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004000d503030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:40 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000600000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x600}, 0x0) [ 2112.816143][T19058] tc_dump_action: action bad kind 09:30:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x700}, 0x0) 09:30:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600952e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:40 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000900683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2112.846035][T19060] loop5: detected capacity change from 0 to 264192 [ 2112.852257][T19066] tc_dump_action: action bad kind [ 2112.864058][T19064] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2112.875641][T19068] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 09:30:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600962e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:40 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000680000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2112.907898][T19075] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2112.939376][T19060] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2112.944797][T19060] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2112.954235][T19070] loop4: detected capacity change from 0 to 545 [ 2112.969248][T19070] EXT4-fs (loop4): bad geometry: block count 64290880 exceeds size of device (68 blocks) [ 2112.974267][T19060] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2112.982042][T19089] tc_dump_action: action bad kind [ 2112.991915][T19085] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2113.003262][T19060] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2113.011664][T19060] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:40 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201050000000a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:40 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000a00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x900}, 0x0) 09:30:40 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080006c0000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600972e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004000d603030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xa00}, 0x0) 09:30:40 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000b00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2113.148501][T19113] tc_dump_action: action bad kind [ 2113.155254][T19114] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 09:30:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600982e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:40 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000740000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:40 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000c00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2113.193295][T19115] loop5: detected capacity change from 0 to 264192 [ 2113.230897][T19115] loop5: p1 < > p2 < > p3 p4 < p5 > 09:30:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600992e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2113.244043][T19115] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2113.251516][T19121] loop4: detected capacity change from 0 to 545 [ 2113.281866][T19121] EXT4-fs (loop4): bad geometry: block count 64356416 exceeds size of device (68 blocks) [ 2113.282464][T19133] tc_dump_action: action bad kind [ 2113.297419][T19115] loop5: p5 size 1914664839 extends beyond EOD, truncated [ 2113.422541][T19115] loop5: detected capacity change from 0 to 264192 09:30:41 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="02010f0000000a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:41 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080007a0000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06009a2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:41 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000d00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xb00}, 0x0) 09:30:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004000d703030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2113.482176][T19115] loop5: p1 < > p2 < > p3 p4 < p5 > [ 2113.488805][T19115] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2113.497302][T19115] loop5: p5 size 1914664839 extends beyond EOD, truncated 09:30:41 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000300000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:41 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000e00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xc00}, 0x0) 09:30:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06009b2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:41 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000500000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2113.532667][T19176] tc_dump_action: action bad kind [ 2113.537825][T19174] loop4: detected capacity change from 0 to 545 09:30:41 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000001000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2113.581985][T19174] EXT4-fs (loop4): bad geometry: block count 64421952 exceeds size of device (68 blocks) [ 2113.627971][T19199] tc_dump_action: action bad kind [ 2113.639913][T19198] loop5: detected capacity change from 0 to 264192 09:30:41 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201540000000a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06009c2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:41 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000600000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xd00}, 0x0) 09:30:41 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000001100683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004000d803030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:41 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000700000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2113.710413][T19198] loop5: p1 < > p2 < > p3 p4 < p5 > [ 2113.717007][T19198] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2113.728582][T19198] loop5: p5 size 1914664839 extends beyond EOD, truncated 09:30:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06009d2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:41 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000001200683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2113.771341][T19222] loop4: detected capacity change from 0 to 545 [ 2113.783546][T19224] tc_dump_action: action bad kind [ 2113.803168][T19222] EXT4-fs (loop4): bad geometry: block count 64487488 exceeds size of device (68 blocks) 09:30:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xe00}, 0x0) 09:30:41 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000002000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:41 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000900000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2113.826580][T19237] loop5: detected capacity change from 0 to 264192 [ 2113.868857][T19249] tc_dump_action: action bad kind 09:30:41 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201550000000a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:41 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000a00000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06009e2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004000d903030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xec0}, 0x0) 09:30:41 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000002500683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2113.929574][T19237] loop5: p1[DM] p2 < > p3 p4 < p5 p6 > [ 2113.935410][T19237] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2113.944229][T19237] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2113.952567][T19237] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2113.960444][T19237] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x1100}, 0x0) [ 2113.997163][T19271] tc_dump_action: action bad kind 09:30:41 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000b00000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x1200}, 0x0) 09:30:41 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000004b4600683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:41 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000c00000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2114.037559][T19285] loop5: detected capacity change from 0 to 264192 [ 2114.044571][T19287] tc_dump_action: action bad kind [ 2114.059263][T19272] loop4: detected capacity change from 0 to 545 [ 2114.070011][T19272] EXT4-fs (loop4): bad geometry: block count 64553024 exceeds size of device (68 blocks) [ 2114.080857][T19285] loop5: p1[EZD] p2 < > p3 p4 < p5 p6 > 09:30:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06009f2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2114.086733][T19285] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2114.097231][T19285] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2114.118078][T19285] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2114.121548][T19301] tc_dump_action: action bad kind [ 2114.135370][T19285] loop5: p6 size 1914664839 extends beyond EOD, truncated [ 2114.221069][T19285] loop5: detected capacity change from 0 to 264192 09:30:42 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201630000000a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:42 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000d00000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:42 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000004800683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004000da03030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600a02e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x1400}, 0x0) [ 2114.282160][T19285] loop5: p1[EZD] p2 < > p3 p4 < p5 p6 > [ 2114.288205][T19285] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2114.297271][T19285] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2114.305514][T19285] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2114.313092][T19285] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:42 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000e00000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:42 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000004c00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:42 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000001100000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2114.342830][T19330] loop4: detected capacity change from 0 to 545 [ 2114.363220][T19330] EXT4-fs (loop4): bad geometry: block count 64618560 exceeds size of device (68 blocks) [ 2114.380015][T19340] tc_dump_action: action bad kind 09:30:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600a12e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2114.391335][T18014] print_req_error: 38 callbacks suppressed [ 2114.391348][T18014] blk_update_request: I/O error, dev loop5, sector 263945 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 2114.410257][T18085] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 2114.423099][T17967] blk_update_request: I/O error, dev loop5, sector 263946 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 09:30:42 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000006000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2114.424842][ T968] blk_update_request: I/O error, dev loop5, sector 263945 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2114.436529][T18016] blk_update_request: I/O error, dev loop5, sector 263946 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 2114.446428][ T968] buffer_io_error: 32 callbacks suppressed [ 2114.446441][ T968] Buffer I/O error on dev loop5p3, logical block 263936, async page read [ 2114.459466][T18015] blk_update_request: I/O error, dev loop5, sector 25 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 09:30:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x2000}, 0x0) [ 2114.477714][ T968] blk_update_request: I/O error, dev loop5, sector 263946 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2114.484038][ T1772] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 2114.494959][ T968] Buffer I/O error on dev loop5p3, logical block 263937, async page read [ 2114.511077][ T968] blk_update_request: I/O error, dev loop5, sector 263947 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2114.523062][ T968] Buffer I/O error on dev loop5p3, logical block 263938, async page read [ 2114.528805][T19353] validate_nla: 182 callbacks suppressed [ 2114.528840][T19353] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2114.531542][ T968] blk_update_request: I/O error, dev loop5, sector 263948 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2114.559411][T19355] tc_dump_action: action bad kind [ 2114.559471][ T968] Buffer I/O error on dev loop5p3, logical block 263939, async page read [ 2114.573265][ T968] blk_update_request: I/O error, dev loop5, sector 263949 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2114.585605][ T968] Buffer I/O error on dev loop5p3, logical block 263940, async page read [ 2114.594066][ T968] Buffer I/O error on dev loop5p3, logical block 263941, async page read [ 2114.602855][ T968] Buffer I/O error on dev loop5p3, logical block 263942, async page read [ 2114.611431][ T968] Buffer I/O error on dev loop5p3, logical block 263943, async page read [ 2114.619978][ T968] Buffer I/O error on dev loop5p4, logical block 0, async page read [ 2114.628123][ T968] Buffer I/O error on dev loop5p2, logical block 0, async page read [ 2114.634345][T19357] loop5: detected capacity change from 0 to 264192 09:30:42 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="020181ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:42 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000001200000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600a22e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:42 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000006800683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x2500}, 0x0) 09:30:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004000db03030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2114.703332][T19357] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2114.708779][T19357] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2114.716545][T19357] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2114.724560][T19357] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2114.732107][T19357] loop5: p6 size 1914664839 extends beyond EOD, truncated [ 2114.767857][T19392] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2114.777649][T19393] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2114.786395][T19395] tc_dump_action: action bad kind [ 2114.789119][T19396] loop4: detected capacity change from 0 to 545 [ 2114.792299][T19394] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2114.806271][T19396] EXT4-fs (loop4): bad geometry: block count 64684096 exceeds size of device (68 blocks) 09:30:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004000dc03030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:42 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000002000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x4800}, 0x0) [ 2114.809036][T19393] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2114.852643][T19393] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:30:42 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000006c00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600a32e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:42 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000002500000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2114.891011][T19410] loop5: detected capacity change from 0 to 264192 [ 2114.891871][T19416] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2114.921142][T19415] loop4: detected capacity change from 0 to 545 [ 2114.923249][T19423] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2114.936695][T19420] tc_dump_action: action bad kind [ 2114.950799][T19415] EXT4-fs (loop4): bad geometry: block count 64749632 exceeds size of device (68 blocks) [ 2114.952698][T19410] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2114.963856][T19424] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2114.968835][T19410] loop5: p1 size 11290111 extends beyond EOD, truncated 09:30:42 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="020185ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x4c00}, 0x0) 09:30:42 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000007400683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004000dd03030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:42 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000004800000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2114.986221][T19410] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2114.988959][T19428] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2114.994715][T19410] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2115.009428][T19410] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600a42e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x5cff}, 0x0) 09:30:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600a52e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2115.064845][T19443] tc_dump_action: action bad kind 09:30:42 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000007a00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:42 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000004c00000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2115.097732][T19445] loop4: detected capacity change from 0 to 545 [ 2115.126663][T19445] EXT4-fs (loop4): bad geometry: block count 64815168 exceeds size of device (68 blocks) [ 2115.140606][T19465] tc_dump_action: action bad kind 09:30:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600a62e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x6000}, 0x0) [ 2115.151721][T19462] loop5: detected capacity change from 0 to 264192 [ 2115.190588][T19462] loop5: p1 < > p2 < > p3 p4 < p5 > 09:30:42 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201a5ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:42 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000ffffff9e00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:42 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000974c00000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004000de03030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600a72e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x6800}, 0x0) [ 2115.199073][T19462] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2115.211494][T19481] tc_dump_action: action bad kind [ 2115.218031][T19462] loop5: p5 size 1914664839 extends beyond EOD, truncated 09:30:43 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000ffffffc300683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004000df03030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2115.258269][T19493] loop4: detected capacity change from 0 to 545 [ 2115.258495][T19494] tc_dump_action: action bad kind [ 2115.269926][T19493] EXT4-fs (loop4): bad geometry: block count 64880704 exceeds size of device (68 blocks) 09:30:43 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000006000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600a82e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:43 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000ffffffea00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x6c00}, 0x0) [ 2115.349882][T19509] loop5: detected capacity change from 0 to 264192 [ 2115.359968][T19516] loop4: detected capacity change from 0 to 545 [ 2115.382997][T19516] EXT4-fs (loop4): bad geometry: block count 64946240 exceeds size of device (68 blocks) [ 2115.407220][T19528] tc_dump_action: action bad kind [ 2115.412974][T19509] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2115.418606][T19509] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2115.427649][T19509] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2115.448760][T19509] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2115.457443][T19509] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:43 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201a6ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:43 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000006800000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x7400}, 0x0) 09:30:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600a92e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:43 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000ffffffef00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004000ed03030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:43 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000006c00000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2115.570329][T19556] loop4: detected capacity change from 0 to 545 [ 2115.585207][T19556] EXT4-fs (loop4): bad geometry: block count 65863744 exceeds size of device (68 blocks) [ 2115.600029][T19561] tc_dump_action: action bad kind 09:30:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600aa2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x7a00}, 0x0) 09:30:43 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000fffffff000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004000f003030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2115.618285][T19563] loop5: detected capacity change from 0 to 264192 09:30:43 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000007400000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2115.652896][T19572] tc_dump_action: action bad kind [ 2115.660696][T19563] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2115.666119][T19563] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2115.689801][T19578] loop4: detected capacity change from 0 to 545 09:30:43 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201a9ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:43 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000fffffffc00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600ab2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:43 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000007a00000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x8100}, 0x0) 09:30:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004000f103030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2115.697365][T19563] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2115.704612][T19578] EXT4-fs (loop4): bad geometry: block count 66060352 exceeds size of device (68 blocks) [ 2115.713606][T19563] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2115.722362][T19563] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xc00e}, 0x0) 09:30:43 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000fffffffe00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2115.757167][T19593] tc_dump_action: action bad kind 09:30:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600ac2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:43 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080004c9700000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2115.791513][T19603] loop4: detected capacity change from 0 to 545 [ 2115.798830][T19603] EXT4-fs (loop4): bad geometry: block count 66125888 exceeds size of device (68 blocks) [ 2115.818223][T19606] tc_dump_action: action bad kind 09:30:43 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000007fffffff00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:43 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000009effffff00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2115.896721][T19625] loop5: detected capacity change from 0 to 264192 [ 2115.955933][T19625] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2115.961731][T19625] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2115.969887][T19625] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2115.978048][T19625] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2115.987044][T19625] loop5: p6 size 1914664839 extends beyond EOD, truncated [ 2116.047361][T19625] loop5: detected capacity change from 0 to 264192 09:30:43 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000004003000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004000f203030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xff5c}, 0x0) 09:30:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600ad2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:43 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201bfffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:43 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000c3ffffff00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2116.089272][T19625] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2116.094579][T19625] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2116.102689][T19625] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2116.110836][T19625] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2116.118958][T19625] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600ae2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x34000}, 0x0) 09:30:43 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000340000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2116.169161][T19669] tc_dump_action: action bad kind 09:30:43 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000eaffffff00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2116.212295][T19665] loop5: detected capacity change from 0 to 264192 [ 2116.224576][T19670] loop4: detected capacity change from 0 to 545 [ 2116.248196][T19687] tc_dump_action: action bad kind 09:30:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600af2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x400300}, 0x0) 09:30:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600b02e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2116.255733][T19670] EXT4-fs (loop4): bad geometry: block count 66191424 exceeds size of device (68 blocks) [ 2116.284270][T19665] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2116.289951][T19665] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2116.303849][T19697] tc_dump_action: action bad kind [ 2116.311168][T19665] loop5: p3 size 1914664839 extends beyond EOD, truncated 09:30:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004000f303030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:44 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000010000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:44 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000efffffff00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2116.332952][T19665] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2116.341382][T19665] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:44 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201eeffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x1000000}, 0x0) 09:30:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600b12e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:44 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000020000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:44 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000f0ffffff00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x2000000}, 0x0) [ 2116.386909][T19715] loop4: detected capacity change from 0 to 545 [ 2116.398005][T19715] EXT4-fs (loop4): bad geometry: block count 66256960 exceeds size of device (68 blocks) [ 2116.425355][T19719] tc_dump_action: action bad kind 09:30:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004000f403030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:44 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000030000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:44 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000fcffffff00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600b22e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:44 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000040000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x3000000}, 0x0) [ 2116.493139][T19741] loop5: detected capacity change from 0 to 264192 [ 2116.518056][T19745] tc_dump_action: action bad kind 09:30:44 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201fdffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:44 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000050000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:44 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000feffffff00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x4000000}, 0x0) 09:30:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600b32e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2116.569284][T19746] loop4: detected capacity change from 0 to 545 [ 2116.584190][T19761] tc_dump_action: action bad kind [ 2116.603047][T19746] EXT4-fs (loop4): bad geometry: block count 66322496 exceeds size of device (68 blocks) 09:30:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x5000000}, 0x0) [ 2116.619100][T19766] tc_dump_action: action bad kind 09:30:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004000f503030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600b42e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x6000000}, 0x0) 09:30:44 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000060000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:44 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000002000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2116.651622][T19772] tc_dump_action: action bad kind [ 2116.684295][T19778] loop5: detected capacity change from 0 to 264192 [ 2116.710907][T19778] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2116.719428][T19778] loop5: p1 size 11290111 extends beyond EOD, truncated 09:30:44 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000003000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2116.730187][T19790] tc_dump_action: action bad kind [ 2116.734385][T19778] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2116.744043][T19778] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2116.752453][T19778] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:44 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201820200ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:44 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000070000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600b52e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x7000000}, 0x0) 09:30:44 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000004000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2116.795933][T19793] loop4: detected capacity change from 0 to 545 [ 2116.816932][T19793] EXT4-fs (loop4): bad geometry: block count 66388032 exceeds size of device (68 blocks) 09:30:44 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000005000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2116.907006][T19818] tc_dump_action: action bad kind 09:30:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000204030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600b62e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:44 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000080000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x8000000}, 0x0) 09:30:44 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000006000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2116.928935][T19822] loop5: detected capacity change from 0 to 264192 09:30:44 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000090000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2116.988132][T19832] loop4: detected capacity change from 0 to 545 [ 2116.993666][T19822] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2117.001705][T19832] EXT4-fs (loop4): bad geometry: block count 67240000 exceeds size of device (68 blocks) [ 2117.006503][T19822] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2117.023189][T19840] tc_dump_action: action bad kind [ 2117.054871][T19822] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2117.075508][T19822] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2117.083101][T19822] loop5: p6 size 1914664839 extends beyond EOD, truncated [ 2117.140193][T19822] loop5: detected capacity change from 0 to 264192 [ 2117.179403][T19822] loop5: p1 p2 < > p3 p4 < p5 p6 > 09:30:44 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201820300ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000604030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:44 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000007000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600b72e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x9000000}, 0x0) 09:30:44 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080000000000a0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2117.184885][T19822] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2117.192464][T19822] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2117.200334][T19822] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2117.208541][T19822] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:44 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080000000000b0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:44 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000008000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xa000000}, 0x0) [ 2117.250933][T19881] tc_dump_action: action bad kind [ 2117.259402][T19879] loop4: detected capacity change from 0 to 545 [ 2117.280300][T19879] EXT4-fs (loop4): bad geometry: block count 67502144 exceeds size of device (68 blocks) 09:30:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600b82e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:45 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000009000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:45 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080000000000c0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2117.299666][T19877] loop5: detected capacity change from 0 to 264192 [ 2117.333186][T19900] tc_dump_action: action bad kind 09:30:45 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201820400ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xb000000}, 0x0) 09:30:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600b92e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:45 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080000000000d0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:45 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000000a000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040001004030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2117.369520][T19877] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2117.375413][T19877] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2117.385140][T19877] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2117.393730][T19877] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2117.401364][T19877] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:45 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080000000000e0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xc000000}, 0x0) 09:30:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600ba2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2117.440234][T19920] tc_dump_action: action bad kind [ 2117.472509][T19927] loop4: detected capacity change from 0 to 545 [ 2117.479702][T19933] tc_dump_action: action bad kind 09:30:45 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000000b000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xd000000}, 0x0) [ 2117.495738][T19931] __nla_validate_parse: 86 callbacks suppressed [ 2117.495753][T19931] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2117.512276][T19927] EXT4-fs (loop4): bad geometry: block count 68157504 exceeds size of device (68 blocks) [ 2117.527181][T19946] loop5: detected capacity change from 0 to 264192 09:30:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600bb2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2117.541336][T19951] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2117.563833][T19946] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2117.576033][T19946] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2117.592132][T19958] tc_dump_action: action bad kind [ 2117.594026][T19946] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2117.605360][T19946] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2117.614986][T19946] loop5: p6 size 1914664839 extends beyond EOD, truncated [ 2117.671429][T19946] loop5: detected capacity change from 0 to 264192 09:30:45 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201820500ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:45 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000100000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:45 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000000c000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000005030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600bc2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xe000000}, 0x0) [ 2117.719118][T19946] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2117.724812][T19946] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2117.733028][T19946] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2117.741193][T19946] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2117.748658][T19946] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x10000000}, 0x0) 09:30:45 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000110000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600bd2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:45 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000000d000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2117.779667][T19989] tc_dump_action: action bad kind [ 2117.784731][T19990] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2117.793967][T19991] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2117.794092][T19992] loop4: detected capacity change from 0 to 545 09:30:45 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000120000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:45 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000000e000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2117.836911][T19998] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2117.846471][T20001] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2117.867202][T19992] EXT4-fs (loop4): bad geometry: block count 83886144 exceeds size of device (68 blocks) [ 2117.877286][ T1772] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 2117.914511][T20008] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2117.939767][T20006] tc_dump_action: action bad kind [ 2117.959195][T20010] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2117.995411][T20012] loop5: detected capacity change from 0 to 264192 [ 2118.058910][T20012] loop_reread_partitions: partition scan of loop5 () failed (rc=-16) 09:30:45 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201820600ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:45 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000200000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600be2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x11000000}, 0x0) 09:30:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000006030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:45 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000010000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2118.132875][T20012] loop5: detected capacity change from 0 to 264192 09:30:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x12000000}, 0x0) 09:30:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600bf2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:45 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000250000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:45 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000011000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:45 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000480000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600c02e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2118.173059][T20046] tc_dump_action: action bad kind [ 2118.179201][T20048] loop4: detected capacity change from 0 to 545 [ 2118.181903][T20049] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2118.198439][T20044] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2118.203116][T20048] EXT4-fs (loop4): bad geometry: block count 100663360 exceeds size of device (68 blocks) [ 2118.301815][T20069] loop5: detected capacity change from 0 to 264192 [ 2118.305405][T20073] tc_dump_action: action bad kind [ 2118.340668][T20069] loop5: p1 p2 < > p3 p4 < p5 p6 > 09:30:46 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201820700ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:46 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000012000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000406030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:46 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080000000004c0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600c12e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x14000000}, 0x0) [ 2118.346170][T20069] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2118.354137][T20069] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2118.362137][T20069] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2118.369836][T20069] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:46 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000600000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:46 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000025000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2118.423497][T20091] tc_dump_action: action bad kind 09:30:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600c22e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2118.447581][T20089] loop4: detected capacity change from 0 to 545 [ 2118.482316][T20089] EXT4-fs (loop4): bad geometry: block count 100925504 exceeds size of device (68 blocks) 09:30:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x20000000}, 0x0) 09:30:46 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000680000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:46 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000048000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2118.492860][T20105] loop5: detected capacity change from 0 to 264192 [ 2118.537908][T20119] tc_dump_action: action bad kind [ 2118.547161][T20105] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2118.553825][T20105] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2118.564581][T20105] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2118.588645][T20105] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2118.597236][T20105] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:46 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201820800ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600c32e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:46 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000004c000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000007030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:46 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080000000006c0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x25000000}, 0x0) 09:30:46 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000060000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:46 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201820900ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) [ 2118.661408][T20105] loop5: detected capacity change from 0 to 264192 09:30:46 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000740000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600c42e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:46 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000068000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2118.727827][T20153] tc_dump_action: action bad kind [ 2118.736915][T20152] loop4: detected capacity change from 0 to 545 [ 2118.749536][T20152] EXT4-fs (loop4): bad geometry: block count 117440576 exceeds size of device (68 blocks) 09:30:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x48000000}, 0x0) 09:30:46 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080000000007a0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600c52e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000009030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:46 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000006c000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2118.831518][T20169] loop5: detected capacity change from 0 to 264192 09:30:46 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800000004c970000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x4c000000}, 0x0) 09:30:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600c62e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2118.877303][T20179] tc_dump_action: action bad kind [ 2118.888320][T20179] tc_dump_action: action bad kind [ 2118.895921][T20182] loop4: detected capacity change from 0 to 545 [ 2118.913322][T20169] loop5: p1 p2 < > p3 p4 < p5 p6 > 09:30:46 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201820a00ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:46 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000074000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004000000a030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2118.918167][T20182] EXT4-fs (loop4): bad geometry: block count 150995008 exceeds size of device (68 blocks) [ 2118.926571][T20169] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2118.944468][T20169] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2118.952867][T20169] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2118.960485][T20169] loop5: p6 size 1914664839 extends beyond EOD, truncated [ 2118.965755][T20199] tc_dump_action: action bad kind 09:30:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x60000000}, 0x0) 09:30:46 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000ffffff9e0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600c72e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:46 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000007a000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:46 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000ffffffea0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2119.035658][T20207] loop4: detected capacity change from 0 to 545 [ 2119.058569][T20206] loop5: detected capacity change from 0 to 264192 [ 2119.061765][T20224] tc_dump_action: action bad kind 09:30:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600c82e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:46 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000030000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x68000000}, 0x0) 09:30:46 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000ffffffef0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2119.080987][T20207] EXT4-fs (loop4): bad geometry: block count 167772224 exceeds size of device (68 blocks) [ 2119.125613][T20234] tc_dump_action: action bad kind [ 2119.141736][T20206] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2119.150491][T20206] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2119.170216][T20206] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2119.178680][T20206] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2119.189215][T20206] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:46 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201820b00ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:46 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000050000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x6c000000}, 0x0) 09:30:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600c92e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004000000b030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:46 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000fffffff00000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:46 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000060000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2119.289099][T20261] tc_dump_action: action bad kind 09:30:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x74000000}, 0x0) 09:30:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x7a000000}, 0x0) [ 2119.317916][T20266] loop5: detected capacity change from 0 to 264192 [ 2119.347124][T20276] tc_dump_action: action bad kind 09:30:47 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000fffffffe0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600ca2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2119.369180][T20266] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2119.375814][T20266] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2119.386791][T20266] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2119.392118][T20269] loop4: detected capacity change from 0 to 545 [ 2119.395282][T20266] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2119.408467][T20266] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:47 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000070000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:47 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201820c00ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600cb2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:47 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080007fffffff0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x81000000}, 0x0) [ 2119.427270][T20289] tc_dump_action: action bad kind [ 2119.432789][T20269] EXT4-fs (loop4): bad geometry: block count 184549440 exceeds size of device (68 blocks) 09:30:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004000000c030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:47 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000090000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600cc2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:47 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080009effffff0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x81ffffff}, 0x0) [ 2119.505521][T20301] tc_dump_action: action bad kind [ 2119.540307][T20313] loop5: detected capacity change from 0 to 264192 [ 2119.559866][T20322] validate_nla: 221 callbacks suppressed [ 2119.559877][T20322] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2119.577918][T20322] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2119.586680][T20322] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2119.591505][T20327] loop4: detected capacity change from 0 to 545 [ 2119.595358][T20320] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2119.609424][T20327] EXT4-fs (loop4): bad geometry: block count 201326656 exceeds size of device (68 blocks) [ 2119.609897][T20313] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2119.622986][T20328] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2119.625191][T20313] loop5: p1 size 11290111 extends beyond EOD, truncated 09:30:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600cd2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:47 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000000a0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:47 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201820d00ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x9effffff}, 0x0) [ 2119.633303][T20325] tc_dump_action: action bad kind [ 2119.641052][T20313] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2119.653243][T20313] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2119.660914][T20313] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:47 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000eaffffff0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004000000d030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2119.708914][T20342] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2119.742057][T20355] netlink: 'syz-executor.3': attribute type 27 has an invalid length. 09:30:47 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000000b0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600ce2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xc00e0000}, 0x0) [ 2119.764066][T20342] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2119.772602][T20356] tc_dump_action: action bad kind [ 2119.778710][T20358] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2119.780919][T20359] loop5: detected capacity change from 0 to 264192 [ 2119.796376][T20342] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:30:47 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000efffffff0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:47 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000000c0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2119.838944][T20359] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2119.844284][T20359] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2119.852079][T20359] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2119.860266][T20359] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2119.860826][T20361] loop4: detected capacity change from 0 to 545 [ 2119.867652][T20359] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600cf2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004000000e030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xeaffffff}, 0x0) [ 2119.874782][T20361] EXT4-fs (loop4): bad geometry: block count 218103872 exceeds size of device (68 blocks) [ 2119.898406][T20382] tc_dump_action: action bad kind [ 2119.988701][T20359] loop5: detected capacity change from 0 to 264192 [ 2119.988939][T20401] tc_dump_action: action bad kind [ 2120.001357][T20403] loop4: detected capacity change from 0 to 545 [ 2120.014766][T20403] EXT4-fs (loop4): bad geometry: block count 234881088 exceeds size of device (68 blocks) [ 2120.029422][T20359] loop5: p1 p2 < > p3 p4 < p5 p6 > 09:30:47 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201820e00ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:47 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000f0ffffff0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:47 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000000d0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600d02e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xefffffff}, 0x0) 09:30:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004000000f030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2120.034763][T20359] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2120.043580][T20359] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2120.056592][T20359] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2120.065350][T20359] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:47 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000feffffff0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:47 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000000e0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xf0ffffff}, 0x0) [ 2120.113006][T20425] tc_dump_action: action bad kind 09:30:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600d12e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:47 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000110000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:47 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000200000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2120.136212][T20427] loop4: detected capacity change from 0 to 545 [ 2120.171905][T18015] print_req_error: 132 callbacks suppressed [ 2120.171917][T18015] blk_update_request: I/O error, dev loop5, sector 25 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 2120.191917][T18085] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 2120.192099][T18016] blk_update_request: I/O error, dev loop5, sector 263946 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 2120.210385][ T968] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2120.216344][T18014] blk_update_request: I/O error, dev loop5, sector 263945 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 2120.225897][ T968] buffer_io_error: 113 callbacks suppressed [ 2120.225908][ T968] Buffer I/O error on dev loop5p4, logical block 0, async page read [ 2120.245118][T17967] blk_update_request: I/O error, dev loop5, sector 263946 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 2120.251773][ T968] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2120.266406][T18020] blk_update_request: I/O error, dev loop5, sector 263945 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 2120.274177][ T968] Buffer I/O error on dev loop5p4, logical block 0, async page read [ 2120.286072][ T1772] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 2120.293988][ T968] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2120.304191][T20427] EXT4-fs (loop4): bad geometry: block count 251658304 exceeds size of device (68 blocks) [ 2120.311895][ T968] Buffer I/O error on dev loop5p4, logical block 0, async page read [ 2120.329907][ T968] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2120.340815][ T968] Buffer I/O error on dev loop5p4, logical block 0, async page read [ 2120.348867][ T968] Buffer I/O error on dev loop5p2, logical block 0, async page read [ 2120.357074][ T968] Buffer I/O error on dev loop5p4, logical block 0, async page read [ 2120.365225][ T968] Buffer I/O error on dev loop5p2, logical block 0, async page read [ 2120.373347][ T968] Buffer I/O error on dev loop5p4, logical block 0, async page read [ 2120.381390][ T968] Buffer I/O error on dev loop5p2, logical block 0, async page read [ 2120.388232][T20449] loop5: detected capacity change from 0 to 264192 [ 2120.389437][ T968] Buffer I/O error on dev loop5p6, logical block 263936, async page read 09:30:48 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201820f00ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600d22e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:48 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000300000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:48 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000120000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xfeffffff}, 0x0) 09:30:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000110030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2120.458054][T20449] loop_reread_partitions: partition scan of loop5 () failed (rc=-16) 09:30:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600d32e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xff5c0000}, 0x0) 09:30:48 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000200000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:48 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000400000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600d42e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:48 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000500000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2120.526076][T20467] tc_dump_action: action bad kind [ 2120.543972][T20469] loop4: detected capacity change from 0 to 545 [ 2120.557335][T20472] loop5: detected capacity change from 0 to 264192 [ 2120.630518][T20472] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2120.634346][T20469] EXT4-fs (loop4): bad geometry: block count 268501056 exceeds size of device (68 blocks) [ 2120.636093][T20472] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2120.657720][T20503] tc_dump_action: action bad kind [ 2120.663553][T20472] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2120.672524][T20472] loop5: p5 size 11290111 extends beyond EOD, truncated 09:30:48 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201821000ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:48 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000250000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600d52e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:48 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000600000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xffffff7f}, 0x0) 09:30:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000410030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2120.681366][T20472] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xffffff81}, 0x0) [ 2120.728754][T20516] tc_dump_action: action bad kind 09:30:48 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000004b460000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:48 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000700000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600d62e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2120.796976][T20525] loop4: detected capacity change from 0 to 545 [ 2120.798296][T20534] tc_dump_action: action bad kind [ 2120.808928][T20525] EXT4-fs (loop4): bad geometry: block count 268697664 exceeds size of device (68 blocks) 09:30:48 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000800000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xffffff9e}, 0x0) [ 2120.842297][T20538] loop5: detected capacity change from 0 to 264192 [ 2120.893141][T20538] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2120.900410][T20538] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2120.915084][T20538] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2120.916335][T20555] tc_dump_action: action bad kind [ 2120.931100][T20538] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2120.939705][T20538] loop5: p6 size 1914664839 extends beyond EOD, truncated [ 2120.998040][T20538] loop5: detected capacity change from 0 to 264192 09:30:48 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201821100ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:48 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000480000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600d72e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040002010030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:48 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000900000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xffffffea}, 0x0) [ 2121.049341][T20538] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2121.054956][T20538] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2121.063219][T20538] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2121.072079][T20538] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2121.080687][T20538] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xffffffef}, 0x0) 09:30:48 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000a00000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600d82e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2121.109994][T20581] tc_dump_action: action bad kind [ 2121.116475][T20583] loop4: detected capacity change from 0 to 545 09:30:48 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000b00000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:48 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000464b0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xfffffff0}, 0x0) [ 2121.160859][T20592] tc_dump_action: action bad kind [ 2121.188029][ T1772] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 2121.195216][T20583] EXT4-fs (loop4): bad geometry: block count 270532672 exceeds size of device (68 blocks) [ 2121.252376][T20603] tc_dump_action: action bad kind [ 2121.292122][T20608] loop5: detected capacity change from 0 to 264192 [ 2121.363955][T20608] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2121.370001][T20608] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2121.377771][T20608] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2121.386392][T20608] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2121.394173][T20608] loop5: p6 size 1914664839 extends beyond EOD, truncated [ 2121.451975][T20608] loop5: detected capacity change from 0 to 264192 [ 2121.480129][T20608] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2121.486622][T20608] loop5: p1 size 11290111 extends beyond EOD, truncated 09:30:49 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201821200ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600d92e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:49 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000c00000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:49 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000004c0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xfffffffe}, 0x0) 09:30:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000011030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2121.495542][T20608] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2121.503871][T20608] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2121.511399][T20608] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600da2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:49 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000d00000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:49 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000600000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x40030000000000}, 0x0) [ 2121.552586][T20656] tc_dump_action: action bad kind [ 2121.571149][T20657] loop4: detected capacity change from 0 to 545 [ 2121.602014][T20657] EXT4-fs (loop4): bad geometry: block count 285212736 exceeds size of device (68 blocks) [ 2121.612338][T20671] tc_dump_action: action bad kind 09:30:49 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000e00000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x100000000000000}, 0x0) [ 2121.675226][T20682] loop5: detected capacity change from 0 to 264192 [ 2121.709782][T20691] tc_dump_action: action bad kind [ 2121.721382][T20682] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2121.730037][T20682] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2121.737996][T20682] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2121.746098][T20682] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2121.753707][T20682] loop5: p6 size 1914664839 extends beyond EOD, truncated [ 2121.842311][T20682] loop5: detected capacity change from 0 to 264192 09:30:49 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000680000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000012030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600db2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:49 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000001000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:49 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201821300ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x200000000000000}, 0x0) [ 2121.888982][T20682] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2121.894304][T20682] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2121.903333][T20682] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2121.911393][T20682] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2121.919188][T20682] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600dc2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000219030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2121.970618][T20730] loop4: detected capacity change from 0 to 545 [ 2121.980710][T20734] tc_dump_action: action bad kind [ 2121.984504][T20730] EXT4-fs (loop4): bad geometry: block count 301989952 exceeds size of device (68 blocks) 09:30:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x300000000000000}, 0x0) 09:30:49 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000001100000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:49 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000006c0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600dd2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:49 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000001200000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2122.015519][T20732] loop5: detected capacity change from 0 to 264192 09:30:49 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000740000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600de2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:49 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000002500000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2122.086984][T20732] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2122.099441][T20732] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2122.116409][T20765] tc_dump_action: action bad kind [ 2122.141616][T20732] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2122.142059][T20764] loop4: detected capacity change from 0 to 545 [ 2122.157667][T20732] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2122.169369][T20732] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:49 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201821400ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x400000000000000}, 0x0) 09:30:49 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000007a0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2122.190575][T20764] EXT4-fs (loop4): bad geometry: block count 419561536 exceeds size of device (68 blocks) 09:30:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000020030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:49 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000004800000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600df2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x500000000000000}, 0x0) 09:30:49 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000400300683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2122.271268][T20791] tc_dump_action: action bad kind 09:30:50 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000004c00000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2122.335535][T20793] loop5: detected capacity change from 0 to 264192 [ 2122.355570][T20816] tc_dump_action: action bad kind [ 2122.362331][T20793] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2122.367897][T20793] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2122.377025][T20793] loop5: p3 size 1914664839 extends beyond EOD, truncated 09:30:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600e02e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:50 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000006000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2122.387663][T20815] loop4: detected capacity change from 0 to 545 [ 2122.395473][T20793] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2122.403333][T20793] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:50 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000034000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:50 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201821500ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x600000000000000}, 0x0) 09:30:50 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000006800000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2122.437479][T20815] EXT4-fs (loop4): bad geometry: block count 536870976 exceeds size of device (68 blocks) 09:30:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040001020030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:50 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000000400ad00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600e12e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x700000000000000}, 0x0) 09:30:50 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000006c00000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2122.495703][T20837] tc_dump_action: action bad kind [ 2122.506722][T20838] __nla_validate_parse: 79 callbacks suppressed [ 2122.506738][T20838] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2122.548649][T20850] loop5: detected capacity change from 0 to 264192 [ 2122.601333][T20859] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2122.608210][T20860] loop4: detected capacity change from 0 to 545 [ 2122.610934][T20861] tc_dump_action: action bad kind [ 2122.622861][T20863] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2122.635497][T20850] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2122.642363][T20850] loop5: p1 size 11290111 extends beyond EOD, truncated 09:30:50 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000001683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600e22e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:50 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000007400000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x800000000000000}, 0x0) [ 2122.642515][T20860] EXT4-fs (loop4): bad geometry: block count 537919552 exceeds size of device (68 blocks) [ 2122.661178][T20850] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2122.685480][T20850] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2122.712559][T20879] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2122.722167][T20850] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:50 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201821600ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000221030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x900000000000000}, 0x0) 09:30:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600e32e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2122.770382][T20881] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2122.779916][T20882] tc_dump_action: action bad kind 09:30:50 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000002683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:50 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000007a00000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2122.842759][T20889] loop4: detected capacity change from 0 to 545 [ 2122.852382][T20889] EXT4-fs (loop4): bad geometry: block count 553779264 exceeds size of device (68 blocks) [ 2122.871106][T20912] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2122.873273][T20890] loop5: detected capacity change from 0 to 264192 09:30:50 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000003000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:50 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000003683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600e42e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2122.890542][T20915] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2122.925627][T20920] tc_dump_action: action bad kind 09:30:50 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000004683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000022030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xa00000000000000}, 0x0) [ 2122.936912][T20924] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2122.961746][T20923] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2122.978116][T20890] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2122.990684][T20930] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2123.000072][T20890] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2123.020894][T20890] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2123.024754][T20936] loop4: detected capacity change from 0 to 545 [ 2123.029095][T20935] tc_dump_action: action bad kind [ 2123.040938][T20890] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2123.048035][T20936] EXT4-fs (loop4): bad geometry: block count 570425408 exceeds size of device (68 blocks) [ 2123.058503][T20890] loop5: p6 size 1914664839 extends beyond EOD, truncated [ 2123.120792][T20890] loop5: detected capacity change from 0 to 264192 [ 2123.158955][T20890] loop5: p1 p2 < > p3 p4 < p5 p6 > 09:30:50 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201821700ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:50 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000ad0004683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:50 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000005000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600e52e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xb00000000000000}, 0x0) 09:30:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000025030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2123.164393][T20890] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2123.172707][T20890] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2123.181278][T20890] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2123.189173][T20890] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:50 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000005683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600e62e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:50 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000006000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:50 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000006683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xc00000000000000}, 0x0) [ 2123.231646][T20971] loop4: detected capacity change from 0 to 545 [ 2123.243840][T20974] tc_dump_action: action bad kind 09:30:51 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000007683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2123.293245][T20971] EXT4-fs (loop4): bad geometry: block count 620757056 exceeds size of device (68 blocks) [ 2123.301770][ T1772] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 2123.342562][T20987] tc_dump_action: action bad kind [ 2123.419247][T20994] loop5: detected capacity change from 0 to 264192 [ 2123.460648][T20994] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2123.466103][T20994] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2123.474891][T20994] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2123.483361][T20994] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2123.491224][T20994] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:51 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201821800ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xd00000000000000}, 0x0) 09:30:51 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000007000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600e72e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:51 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000008683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004000e826030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:51 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000009000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:51 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000009683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:51 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000000000000a683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2123.601539][T21033] tc_dump_action: action bad kind [ 2123.612478][T21030] loop4: detected capacity change from 0 to 545 [ 2123.625931][T21030] EXT4-fs (loop4): bad geometry: block count 652738624 exceeds size of device (68 blocks) 09:30:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600e82e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:51 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800000000a000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xe00000000000000}, 0x0) [ 2123.714791][T21049] loop5: detected capacity change from 0 to 264192 [ 2123.784878][T21049] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2123.789105][T21064] tc_dump_action: action bad kind [ 2123.791235][T21049] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2123.803810][T21049] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2123.812101][T21049] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2123.820263][T21049] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:51 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201821900ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:51 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000000000000b683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000227030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:51 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800000000b000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600e92e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x1000000000000000}, 0x0) 09:30:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600ea2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2123.939827][T21088] loop4: detected capacity change from 0 to 545 [ 2123.954435][T21088] EXT4-fs (loop4): bad geometry: block count 654442560 exceeds size of device (68 blocks) [ 2123.977217][T21096] tc_dump_action: action bad kind 09:30:51 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800000000c000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600eb2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:51 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800000000d000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004000002e030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:51 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000000000000c683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2123.984296][T21095] loop5: detected capacity change from 0 to 264192 [ 2124.066420][T21095] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2124.071868][T21095] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2124.086754][T21095] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2124.090882][T21116] loop4: detected capacity change from 0 to 545 [ 2124.097973][T21095] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2124.107995][T21116] EXT4-fs (loop4): bad geometry: block count 771752000 exceeds size of device (68 blocks) [ 2124.112815][T21095] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:51 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201821a00ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x1100000000000000}, 0x0) 09:30:51 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800000000e000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600ec2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:51 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000000000000d683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004000003f030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:51 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000000000000e683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:51 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000011000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:51 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000010683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2124.235898][T21145] tc_dump_action: action bad kind 09:30:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x1200000000000000}, 0x0) 09:30:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600ed2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2124.258536][T21146] loop4: detected capacity change from 0 to 545 [ 2124.268436][T21143] loop5: detected capacity change from 0 to 264192 [ 2124.281924][T21146] EXT4-fs (loop4): bad geometry: block count 1056964672 exceeds size of device (68 blocks) 09:30:52 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000011683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2124.309873][T21143] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2124.315903][T21143] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2124.345049][T21143] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2124.356295][T21143] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2124.364227][T21143] loop5: p6 size 1914664839 extends beyond EOD, truncated [ 2124.369854][T21174] tc_dump_action: action bad kind 09:30:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600ee2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:52 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000012000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x1400000000000000}, 0x0) 09:30:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000040030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:52 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201821b00ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:52 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000012683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2124.492029][T21143] loop5: detected capacity change from 0 to 264192 09:30:52 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000020683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2124.537791][T21206] loop4: detected capacity change from 0 to 545 [ 2124.549259][T21206] EXT4-fs (loop4): bad geometry: block count 1073741888 exceeds size of device (68 blocks) [ 2124.554015][T21215] tc_dump_action: action bad kind [ 2124.570004][T21216] validate_nla: 179 callbacks suppressed [ 2124.570063][T21216] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:30:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600ef2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x2000000000000000}, 0x0) [ 2124.585198][T21217] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2124.593896][T21220] netlink: 'syz-executor.3': attribute type 27 has an invalid length. 09:30:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000044030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:52 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000020000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:52 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000025683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2124.629862][T21213] loop5: detected capacity change from 0 to 264192 [ 2124.664243][T21231] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:30:52 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000004b46683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2124.675247][T21231] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2124.684114][T21236] tc_dump_action: action bad kind [ 2124.689570][T21235] loop4: detected capacity change from 0 to 545 [ 2124.691640][T21238] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2124.708689][T21213] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2124.713743][T21231] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2124.720934][T21213] loop5: p1 size 11290111 extends beyond EOD, truncated 09:30:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x2500000000000000}, 0x0) 09:30:52 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000025000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600f02e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2124.722313][T21240] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2124.754328][T21235] EXT4-fs (loop4): bad geometry: block count 1140850752 exceeds size of device (68 blocks) [ 2124.754574][T21213] loop5: p3 size 1914664839 extends beyond EOD, truncated 09:30:52 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201821c00ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000048030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:52 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000048683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x4800000000000000}, 0x0) 09:30:52 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000048000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600f12e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2124.778957][T21245] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2124.787326][T21213] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2124.798783][T21251] tc_dump_action: action bad kind [ 2124.803990][T21252] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2124.815779][T21213] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:52 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000000000004c683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:52 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800000004c000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600f22e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x4c00000000000000}, 0x0) [ 2124.877733][T21264] tc_dump_action: action bad kind 09:30:52 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000060683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:52 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800000974c000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2124.973908][T21293] tc_dump_action: action bad kind [ 2124.991454][T21294] loop5: detected capacity change from 0 to 264192 [ 2124.998113][T21269] loop4: detected capacity change from 0 to 545 [ 2125.010394][T21269] EXT4-fs (loop4): bad geometry: block count 1207959616 exceeds size of device (68 blocks) [ 2125.039947][T21294] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2125.045361][T21294] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2125.053305][T21294] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2125.062449][T21294] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2125.070478][T21294] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:52 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201821d00ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:52 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000068683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x6000000000000000}, 0x0) 09:30:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600f32e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:52 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000060000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004000004c030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:52 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000068000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:52 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000000000006c683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2125.187093][T21317] tc_dump_action: action bad kind [ 2125.190480][T21332] loop5: detected capacity change from 0 to 264192 [ 2125.202540][T21334] loop4: detected capacity change from 0 to 545 09:30:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600f42e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x6800000000000000}, 0x0) 09:30:52 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800000006c000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:52 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000074683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2125.228610][T21332] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2125.235644][T21334] EXT4-fs (loop4): bad geometry: block count 1275068480 exceeds size of device (68 blocks) [ 2125.236372][T21332] loop5: p1 size 11290111 extends beyond EOD, truncated 09:30:53 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201821e00ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:53 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000074000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x6c00000000000000}, 0x0) 09:30:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000060030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600f52e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:53 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000000000007a683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2125.292430][T21352] tc_dump_action: action bad kind [ 2125.307167][T21332] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2125.326882][T21332] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2125.335274][T21332] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:53 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800000007a000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2125.405431][T21373] loop4: detected capacity change from 0 to 545 [ 2125.444091][T21382] tc_dump_action: action bad kind 09:30:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600f62e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600f72e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:53 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000004c97000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:53 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000ffffff9e683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x7400000000000000}, 0x0) [ 2125.494679][T21373] EXT4-fs (loop4): bad geometry: block count 1610612800 exceeds size of device (68 blocks) [ 2125.506479][T21390] loop5: detected capacity change from 0 to 264192 [ 2125.567484][T21406] tc_dump_action: action bad kind 09:30:53 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201822100ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:53 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000040030000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600f82e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:53 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000ffffffc3683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x7a00000000000000}, 0x0) 09:30:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000068030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2125.602282][T21390] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2125.607806][T21390] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2125.616340][T21390] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2125.625223][T21390] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2125.633634][T21390] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:53 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000003400000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2125.689433][T21423] loop4: detected capacity change from 0 to 545 [ 2125.718042][T21423] EXT4-fs (loop4): bad geometry: block count 1744830528 exceeds size of device (68 blocks) 09:30:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600f92e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2125.738907][T21439] tc_dump_action: action bad kind 09:30:53 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000ffffffea683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004000006c030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:53 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000100683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x8000000000000000}, 0x0) [ 2125.764450][T21442] loop5: detected capacity change from 0 to 264192 [ 2125.810257][T21442] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2125.816008][T21442] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2125.829307][T21442] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2125.845733][T21456] loop4: detected capacity change from 0 to 545 09:30:53 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201822200ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600fa2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:53 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000ffffffef683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:53 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000200683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x8100000000000000}, 0x0) [ 2125.857253][T21462] tc_dump_action: action bad kind [ 2125.866517][T21442] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2125.873687][T21456] EXT4-fs (loop4): bad geometry: block count 1811939392 exceeds size of device (68 blocks) [ 2125.881854][T21442] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600fb2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:53 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000fffffff0683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000074030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:53 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000300683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2125.972470][T21485] loop5: detected capacity change from 0 to 264192 [ 2125.995744][T21490] tc_dump_action: action bad kind [ 2126.011961][T21485] loop5: p1 p2 < > p3 p4 < p5 p6 > 09:30:53 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000fffffffc683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x81ffffff00000000}, 0x0) 09:30:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600fc2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2126.026536][T21485] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2126.040071][T21485] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2126.062311][T21485] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2126.073992][T21502] loop4: detected capacity change from 0 to 545 09:30:53 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201822300ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:53 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000fffffffe683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:53 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000400683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x9effffff00000000}, 0x0) 09:30:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600fd2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2126.102032][T21485] loop5: p6 size 1914664839 extends beyond EOD, truncated [ 2126.108506][T21513] tc_dump_action: action bad kind [ 2126.118554][T21502] EXT4-fs (loop4): bad geometry: block count 1946157120 exceeds size of device (68 blocks) 09:30:53 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000500683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xc00e000000000000}, 0x0) [ 2126.164817][T21521] tc_dump_action: action bad kind 09:30:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004000007a030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600fe2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:53 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000600683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:53 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000007fffffff683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:53 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a600800000009effffff683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2126.279401][T21540] loop5: detected capacity change from 0 to 264192 [ 2126.279806][T21541] tc_dump_action: action bad kind [ 2126.320218][T21540] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2126.329905][T21540] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2126.330069][T21549] loop4: detected capacity change from 0 to 545 [ 2126.346817][T21549] EXT4-fs (loop4): bad geometry: block count 2046820416 exceeds size of device (68 blocks) [ 2126.358137][T21540] loop5: p3 size 1914664839 extends beyond EOD, truncated 09:30:54 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201822400ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xeaffffff00000000}, 0x0) 09:30:54 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000700683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600ff2e000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:54 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000c3ffffff683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000384030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2126.366743][T21540] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2126.375035][T21540] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xefffffff00000000}, 0x0) [ 2126.428918][T21573] tc_dump_action: action bad kind [ 2126.450827][T21574] loop4: detected capacity change from 0 to 545 09:30:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xf0ffffff00000000}, 0x0) 09:30:54 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000800683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:54 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000eaffffff683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600002f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2126.495679][T21591] tc_dump_action: action bad kind [ 2126.503248][T21592] loop5: detected capacity change from 0 to 264192 [ 2126.505532][T21574] EXT4-fs (loop4): bad geometry: block count 2214789184 exceeds size of device (68 blocks) [ 2126.536543][T21596] tc_dump_action: action bad kind [ 2126.542802][T21592] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2126.552121][T21592] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2126.569651][T21592] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2126.578263][T21592] loop5: p5 size 11290111 extends beyond EOD, truncated 09:30:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000388030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:54 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201822500ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xfeffffff00000000}, 0x0) 09:30:54 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000900683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:54 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000efffffff683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600012f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2126.586081][T21592] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:54 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000a00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2126.635763][T21615] loop4: detected capacity change from 0 to 545 [ 2126.651834][T21615] EXT4-fs (loop4): bad geometry: block count 2281898048 exceeds size of device (68 blocks) 09:30:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600022f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:54 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000f0ffffff683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2126.711879][T21635] tc_dump_action: action bad kind 09:30:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xff5c000000000000}, 0x0) 09:30:54 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000b00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000400003d5030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:54 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000c00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2126.744107][T21637] loop5: detected capacity change from 0 to 264192 [ 2126.802123][T21653] tc_dump_action: action bad kind [ 2126.809280][T21637] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2126.814987][T21637] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2126.838615][T21657] loop4: detected capacity change from 0 to 545 [ 2126.838851][T21637] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2126.860185][T21637] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2126.862689][T21657] EXT4-fs (loop4): bad geometry: block count 3573743680 exceeds size of device (68 blocks) [ 2126.870615][T21637] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600032f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:54 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000d00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:54 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000fcffffff683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xffffff7f00000000}, 0x0) 09:30:54 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201822600ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000400003d6030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:54 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000feffffff683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:54 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000000e00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600042f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0xffffffff00000000}, 0x0) 09:30:54 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000001000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:54 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000004003440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2127.034706][T21699] tc_dump_action: action bad kind [ 2127.037238][T21702] loop5: detected capacity change from 0 to 264192 09:30:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600052f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:54 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000001100683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:54 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000020000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2127.119436][T21702] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2127.124963][T21702] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2127.129838][T21697] loop4: detected capacity change from 0 to 545 [ 2127.151788][T21697] EXT4-fs (loop4): bad geometry: block count 3590520896 exceeds size of device (68 blocks) [ 2127.162539][T21702] loop5: p3 size 1914664839 extends beyond EOD, truncated 09:30:54 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000001200683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2127.172476][T21723] tc_dump_action: action bad kind [ 2127.182048][T21702] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2127.193292][T21702] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:55 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201822700ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600062f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x2}, 0x0) 09:30:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000400003d7030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:55 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000030000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:55 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000002000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:55 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000040000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x3}, 0x0) 09:30:55 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000002500683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:55 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000050000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600072f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2127.400771][T21756] loop4: detected capacity change from 0 to 545 [ 2127.412114][T21771] loop5: detected capacity change from 0 to 264192 [ 2127.437814][T21756] EXT4-fs (loop4): bad geometry: block count 3607298112 exceeds size of device (68 blocks) 09:30:55 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000004800683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2127.463784][T21771] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2127.470175][T21771] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2127.479837][T21771] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2127.496279][T21771] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2127.518553][T21793] __nla_validate_parse: 87 callbacks suppressed [ 2127.518569][T21793] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2127.522871][T21771] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:55 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201822800ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x4}, 0x0) 09:30:55 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000060000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600082f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000400003d8030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:55 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000004c00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2127.610877][T21771] loop5: detected capacity change from 0 to 264192 09:30:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x5}, 0x0) [ 2127.668715][T21816] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2127.679525][T21817] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2127.682899][T21819] loop4: detected capacity change from 0 to 545 [ 2127.695300][T21814] loop5: detected capacity change from 0 to 264192 [ 2127.714719][ T1026] ================================================================== [ 2127.722832][ T1026] BUG: KCSAN: data-race in page_cache_ra_unbounded / task_dump_owner [ 2127.730996][ T1026] [ 2127.733332][ T1026] write to 0xffff88814493506c of 4 bytes by task 18016 on cpu 0: [ 2127.741040][ T1026] page_cache_ra_unbounded+0x3e3/0x410 [ 2127.746606][ T1026] force_page_cache_ra+0x246/0x280 [ 2127.752847][ T1026] page_cache_sync_ra+0xcc/0xe0 [ 2127.757712][ T1026] filemap_read+0x388/0x1230 [ 2127.762292][ T1026] generic_file_read_iter+0x75/0x2c0 [ 2127.767564][ T1026] blkdev_read_iter+0xb9/0xf0 [ 2127.772229][ T1026] vfs_read+0x565/0x5d0 [ 2127.776369][ T1026] ksys_read+0xce/0x180 [ 2127.780520][ T1026] __x64_sys_read+0x3e/0x50 [ 2127.785032][ T1026] do_syscall_64+0x4a/0x90 [ 2127.789453][ T1026] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2127.795342][ T1026] [ 2127.797648][ T1026] read to 0xffff88814493506c of 4 bytes by task 1026 on cpu 1: [ 2127.805168][ T1026] task_dump_owner+0x2b/0x1d0 [ 2127.809830][ T1026] pid_revalidate+0x69/0x110 [ 2127.814403][ T1026] lookup_fast+0x1fd/0x350 [ 2127.818800][ T1026] walk_component+0x5c/0x350 [ 2127.823375][ T1026] link_path_walk+0x4ba/0x780 [ 2127.828032][ T1026] path_openat+0x1a0/0x20b0 [ 2127.832539][ T1026] do_filp_open+0xd9/0x1f0 [ 2127.836936][ T1026] do_sys_openat2+0xa3/0x250 [ 2127.841512][ T1026] __x64_sys_open+0xe2/0x110 [ 2127.846174][ T1026] do_syscall_64+0x4a/0x90 [ 2127.850572][ T1026] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2127.856449][ T1026] [ 2127.858753][ T1026] Reported by Kernel Concurrency Sanitizer on: 09:30:55 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000070000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600092f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2127.864876][ T1026] CPU: 1 PID: 1026 Comm: systemd-journal Not tainted 5.12.0-syzkaller #0 [ 2127.873268][ T1026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2127.883304][ T1026] ================================================================== [ 2127.899050][T21814] loop5: p1 p2 < > p3 p4 < p5 p6 > 09:30:55 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000006000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2127.915380][T21814] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2127.935875][T21830] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2127.943136][T21814] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2127.954042][T21814] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2127.961858][T21814] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x6}, 0x0) 09:30:55 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000080000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2127.971806][T21839] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2128.005879][T21819] EXT4-fs (loop4): bad geometry: block count 3624075328 exceeds size of device (68 blocks) [ 2128.035983][T21845] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2128.076972][T21814] loop5: detected capacity change from 0 to 264192 09:30:55 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201822900ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06000a2f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x7}, 0x0) 09:30:55 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000006800683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:55 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000090000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000400003d9030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2128.129433][T21814] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2128.134814][T21814] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2128.142878][T21814] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2128.150871][T21814] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2128.158454][T21814] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x8}, 0x0) [ 2128.207477][T21874] loop4: detected capacity change from 0 to 545 [ 2128.224023][T21878] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2128.238691][T21880] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 09:30:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06000b2f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:55 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000000a0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x9}, 0x0) 09:30:55 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000006c00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2128.257316][T21874] EXT4-fs (loop4): bad geometry: block count 3640852544 exceeds size of device (68 blocks) [ 2128.278303][T21879] loop5: detected capacity change from 0 to 264192 09:30:56 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000000b0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2128.299508][T21895] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2128.308972][T21898] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2128.333843][T21879] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2128.344407][T21879] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2128.359979][T21879] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2128.369410][T21879] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2128.377351][T21879] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:56 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201822a00ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06000c2f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:56 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000007400683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000400003da030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0xa}, 0x0) 09:30:56 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000000c0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:56 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000007a00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2128.470152][T21879] loop5: detected capacity change from 0 to 264192 09:30:56 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000000d0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:56 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080000000004c9700683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06000d2f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2128.546565][T21934] loop4: detected capacity change from 0 to 545 [ 2128.552953][T21931] loop5: detected capacity change from 0 to 264192 09:30:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0xb}, 0x0) 09:30:56 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800000ffffff9e00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2128.596089][T21931] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2128.601896][T21934] EXT4-fs (loop4): bad geometry: block count 3657629760 exceeds size of device (68 blocks) [ 2128.612956][T21931] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2128.632650][T21931] loop5: p3 size 1914664839 extends beyond EOD, truncated 09:30:56 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201822b00ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000400003db030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0xc}, 0x0) 09:30:56 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000000e0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2128.642640][T21931] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2128.650519][T21931] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06000e2f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:56 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800000ffffffea00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06000f2f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:56 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000100000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:56 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800000ffffffef00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2128.765373][T21979] loop5: detected capacity change from 0 to 264192 [ 2128.794937][T21986] loop4: detected capacity change from 0 to 545 09:30:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0xd}, 0x0) 09:30:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600102f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:56 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000110000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2128.817423][T21986] EXT4-fs (loop4): bad geometry: block count 3674406976 exceeds size of device (68 blocks) [ 2128.837443][T21979] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2128.847054][T21979] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2128.881528][T21979] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2128.908142][T21979] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2128.918154][T21979] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:56 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201822c00ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000400003dc030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0xe}, 0x0) 09:30:56 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800000fffffff000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600112f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:56 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000120000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2128.980295][T21979] loop5: detected capacity change from 0 to 264192 09:30:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x10}, 0x0) 09:30:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600122f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:56 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000250000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2129.042744][T22030] loop4: detected capacity change from 0 to 545 09:30:56 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000480000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:56 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800000fffffffe00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600132f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2129.087357][T22030] EXT4-fs (loop4): bad geometry: block count 3691184192 exceeds size of device (68 blocks) [ 2129.098771][T22044] loop5: detected capacity change from 0 to 264192 [ 2129.183239][T22044] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2129.188646][T22044] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2129.196308][T22044] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2129.204521][T22044] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2129.212039][T22044] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:56 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201822d00ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:56 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000004c0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x11}, 0x0) 09:30:56 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000007fffffff00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600142f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000400003dd030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600152f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x12}, 0x0) 09:30:57 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000009effffff00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:57 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000600000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x14}, 0x0) [ 2129.363430][T22086] loop4: detected capacity change from 0 to 545 [ 2129.376570][T22087] loop5: detected capacity change from 0 to 264192 09:30:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600162f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2129.410650][T22087] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2129.416155][T22087] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2129.423952][T22086] EXT4-fs (loop4): bad geometry: block count 3707961408 exceeds size of device (68 blocks) [ 2129.435062][T22087] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2129.451157][T22087] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2129.474451][T22087] loop5: p6 size 1914664839 extends beyond EOD, truncated [ 2129.540804][T22087] loop5: detected capacity change from 0 to 264192 [ 2129.568478][T22087] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2129.574039][T22087] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2129.582641][T22087] loop5: p3 size 1914664839 extends beyond EOD, truncated 09:30:57 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201822e00ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:57 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800000eaffffff00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x25}, 0x0) 09:30:57 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000680000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600172f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000400003de030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2129.590946][T22087] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2129.598588][T22087] loop5: p6 size 1914664839 extends beyond EOD, truncated [ 2129.629787][T22150] validate_nla: 205 callbacks suppressed 09:30:57 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000006c0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x48}, 0x0) [ 2129.629802][T22150] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2129.651957][T22151] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2129.664658][T22152] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2129.683190][T22152] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:30:57 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800000efffffff00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2129.736043][T22153] loop4: detected capacity change from 0 to 545 [ 2129.746797][T22153] EXT4-fs (loop4): bad geometry: block count 3724738624 exceeds size of device (68 blocks) [ 2129.751678][T22152] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2129.779748][T22168] netlink: 'syz-executor.3': attribute type 27 has an invalid length. 09:30:57 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000740000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x4c}, 0x0) 09:30:57 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800000f0ffffff00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2129.812817][T22172] loop5: detected capacity change from 0 to 264192 [ 2129.823327][T22175] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2129.859091][T22182] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2129.871256][T22172] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2129.876796][T22172] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2129.890801][T22184] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2129.900156][T22172] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2129.913262][T22172] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2129.921611][T22172] loop5: p6 size 1914664839 extends beyond EOD, truncated [ 2130.023278][T22172] loop5: detected capacity change from 0 to 264192 09:30:57 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201822f00ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600182f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x60}, 0x0) 09:30:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000400003df030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:57 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000007a0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:57 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800000feffffff00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x68}, 0x0) [ 2130.078370][T22172] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2130.083869][T22172] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2130.092216][T22172] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2130.100574][T22172] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2130.107874][T22172] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:57 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000300683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:57 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000002000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x6c}, 0x0) 09:30:57 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000003000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2130.159300][T22216] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2130.168889][T22215] loop4: detected capacity change from 0 to 545 [ 2130.198901][T22215] EXT4-fs (loop4): bad geometry: block count 3741515840 exceeds size of device (68 blocks) 09:30:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600192f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2130.312346][T22245] loop5: detected capacity change from 0 to 264192 [ 2130.358407][T22245] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2130.363794][T22245] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2130.371663][T22245] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2130.379800][T22245] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2130.387139][T22245] loop5: p6 size 1914664839 extends beyond EOD, truncated [ 2130.469943][T22245] loop5: detected capacity change from 0 to 264192 [ 2130.527743][T22245] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2130.533209][T22245] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2130.541179][T22245] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2130.550134][T22245] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2130.558480][T22245] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:58 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201823000ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x74}, 0x0) 09:30:58 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000004000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000400026e8030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:58 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000500683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06001a2f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x7a}, 0x0) 09:30:58 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000600683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:58 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000005000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06001b2f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:58 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000006000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:58 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000700683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2130.694691][T22282] loop4: detected capacity change from 0 to 545 [ 2130.707352][T22286] loop5: detected capacity change from 0 to 264192 [ 2130.723029][T22282] EXT4-fs (loop4): bad geometry: block count 3894804544 exceeds size of device (68 blocks) [ 2130.784269][T22286] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2130.790055][T22286] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2130.797662][T22286] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2130.805514][T22286] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2130.813793][T22286] loop5: p6 size 1914664839 extends beyond EOD, truncated [ 2130.910364][T22286] loop5: detected capacity change from 0 to 264192 09:30:58 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201823100ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x300}, 0x0) 09:30:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000400003ed030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06001c2f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:58 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000900683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:58 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000007000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:58 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000a00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2130.968168][T22286] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2130.973489][T22286] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2130.981784][T22286] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2130.990072][T22286] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2130.997456][T22286] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x500}, 0x0) 09:30:58 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000008000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:58 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000b00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06001d2f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:58 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000009000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2131.133096][T22352] loop4: detected capacity change from 0 to 545 [ 2131.164666][T22352] EXT4-fs (loop4): bad geometry: block count 3976396864 exceeds size of device (68 blocks) [ 2131.192651][T22372] loop5: detected capacity change from 0 to 264192 [ 2131.241206][T22372] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2131.247087][T22372] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2131.260774][T22372] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2131.271320][T22372] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2131.279102][T22372] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:59 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201823200ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:59 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000c00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x600}, 0x0) 09:30:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06001e2f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:59 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800000000a000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:59 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000400003f0030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:59 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000d00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:59 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800000000b000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x700}, 0x0) 09:30:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06001f2f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2131.393364][T22404] loop4: detected capacity change from 0 to 545 [ 2131.412760][T22404] EXT4-fs (loop4): bad geometry: block count 4026728512 exceeds size of device (68 blocks) [ 2131.488879][T22425] loop5: detected capacity change from 0 to 264192 09:30:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x900}, 0x0) 09:30:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600202f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2131.529282][T22425] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2131.534914][T22425] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2131.594552][T22425] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2131.606292][T22425] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2131.613988][T22425] loop5: p6 size 1914664839 extends beyond EOD, truncated [ 2131.643614][ T1033] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2131.649164][ T1033] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2131.657115][ T1033] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2131.665012][ T1033] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2131.672363][ T1033] loop5: p6 size 1914664839 extends beyond EOD, truncated [ 2131.710315][T22425] loop5: detected capacity change from 0 to 264192 09:30:59 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201823300ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:59 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000e00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:59 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000400003f1030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:59 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800000000c000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600212f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0xa00}, 0x0) [ 2131.755145][T22425] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2131.760532][T22425] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2131.768828][T22425] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2131.777029][T22425] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2131.784709][T22425] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:59 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800000000d000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0xb00}, 0x0) 09:30:59 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000001100683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2131.886721][T22494] loop4: detected capacity change from 0 to 545 [ 2131.905295][T22494] EXT4-fs (loop4): bad geometry: block count 4043505728 exceeds size of device (68 blocks) 09:30:59 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800000000e000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600222f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:59 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000001200683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2131.943078][T22502] loop5: detected capacity change from 0 to 264192 [ 2131.985053][T22502] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2131.990814][T22502] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2132.019507][T22502] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2132.032284][T22502] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2132.040768][T22502] loop5: p6 size 1914664839 extends beyond EOD, truncated [ 2132.111549][T22502] loop5: detected capacity change from 0 to 264192 09:30:59 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201823400ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:30:59 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000400003f2030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:30:59 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000010000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600232f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0xc00}, 0x0) 09:30:59 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000002000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2132.158198][T22502] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2132.163578][T22502] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2132.171937][T22502] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2132.180746][T22502] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2132.188654][T22502] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:30:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600242f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:30:59 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000002500683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:30:59 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000011000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0xd00}, 0x0) [ 2132.259619][T22558] loop4: detected capacity change from 0 to 545 [ 2132.292032][T22558] EXT4-fs (loop4): bad geometry: block count 4060282944 exceeds size of device (68 blocks) 09:31:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0xe00}, 0x0) [ 2132.323204][T22566] loop5: detected capacity change from 0 to 264192 09:31:00 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000012000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2132.367573][T22566] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2132.373179][T22566] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2132.381471][T22566] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2132.390214][T22566] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2132.399380][T22566] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:31:00 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201823500ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:31:00 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a60080000000004b4600683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600252f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:31:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000400003f3030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:31:00 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000025000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0xec0}, 0x0) 09:31:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x1100}, 0x0) 09:31:00 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000004800683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:00 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000048000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600262f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2132.557675][T22615] __nla_validate_parse: 60 callbacks suppressed [ 2132.557709][T22615] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2132.571698][T22620] loop5: detected capacity change from 0 to 264192 [ 2132.581817][T22616] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2132.619141][T22620] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2132.625782][T22626] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2132.635160][T22617] loop4: detected capacity change from 0 to 545 [ 2132.642116][T22620] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2132.649392][T22617] EXT4-fs (loop4): bad geometry: block count 4077060160 exceeds size of device (68 blocks) 09:31:00 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800000004c000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x1200}, 0x0) [ 2132.664872][T22620] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2132.665329][T22629] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2132.687652][T22620] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2132.705909][T22620] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:31:00 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201823600ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:31:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600272f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:31:00 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000464b00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000400003f4030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:31:00 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000060000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x1400}, 0x0) [ 2132.733472][T22645] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 09:31:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600282f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2132.827890][T22667] loop4: detected capacity change from 0 to 545 [ 2132.848983][T22657] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2132.861195][T22667] EXT4-fs (loop4): bad geometry: block count 4093837376 exceeds size of device (68 blocks) [ 2132.871712][T22671] loop5: detected capacity change from 0 to 264192 09:31:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x2000}, 0x0) 09:31:00 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000068000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:00 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000004c00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600292f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:31:00 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800000006c000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2132.914890][T22684] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2132.937677][T22671] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2132.943315][T22671] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2132.960634][T22689] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2132.978576][T22671] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2132.983059][T22695] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2132.997096][T22671] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2133.011947][T22671] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:31:00 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201823700ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:31:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="20000000400003f5030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:31:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x2500}, 0x0) 09:31:00 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000074000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:00 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000006000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06002a2f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:31:00 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800000007a000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x4800}, 0x0) 09:31:00 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000006800683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06002b2f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:31:00 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000030000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2133.157296][T22716] loop4: detected capacity change from 0 to 545 [ 2133.158446][T22718] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2133.174780][T22717] loop5: detected capacity change from 0 to 264192 09:31:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06002c2f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2133.253979][T22716] EXT4-fs (loop4): bad geometry: block count 4110614592 exceeds size of device (68 blocks) [ 2133.264520][T22717] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2133.272125][T22717] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2133.300241][T22717] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2133.312153][T22717] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2133.329111][T22717] loop5: p6 size 1914664839 extends beyond EOD, truncated [ 2133.409904][T22717] loop5: detected capacity change from 0 to 264192 09:31:01 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201823800ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:31:01 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000006c00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:01 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000050000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x4c00}, 0x0) 09:31:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06002d2f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:31:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004000fffe030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2133.469408][T22717] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2133.474951][T22717] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2133.483026][T22717] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2133.490894][T22717] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2133.498392][T22717] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:31:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06002e2f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:31:01 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000060000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:01 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000007400683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x5cff}, 0x0) 09:31:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06002f2f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2133.605043][T22774] loop4: detected capacity change from 0 to 545 [ 2133.610080][T22777] loop5: detected capacity change from 0 to 264192 [ 2133.630520][T22774] EXT4-fs (loop4): bad geometry: block count 4278124608 exceeds size of device (68 blocks) 09:31:01 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000070000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2133.693705][T22777] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2133.703544][T22777] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2133.742798][T22777] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2133.751199][T22777] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2133.759103][T22777] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:31:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000fff030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:31:01 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201823900ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:31:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600302f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:31:01 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000090000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:01 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000007a00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x6000}, 0x0) 09:31:01 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080000000000a0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x6800}, 0x0) [ 2133.870863][T22831] loop4: detected capacity change from 0 to 545 [ 2133.896606][T22846] loop5: detected capacity change from 0 to 264192 09:31:01 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000200683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600312f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:31:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x6c00}, 0x0) [ 2133.924624][T22831] EXT4-fs (loop4): bad geometry: block count 4279173184 exceeds size of device (68 blocks) [ 2133.953552][T22846] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2133.960124][T22846] loop5: p1 size 11290111 extends beyond EOD, truncated 09:31:01 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080000000000b0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004000feff030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2133.979152][T22846] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2134.005282][T22846] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2134.015832][T22846] loop5: p6 size 1914664839 extends beyond EOD, truncated [ 2134.062707][T22875] loop4: detected capacity change from 0 to 545 09:31:01 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201823a00ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:31:01 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000300683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x7400}, 0x0) 09:31:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600322f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:31:01 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080000000000c0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2134.112406][T22875] EXT4-fs (loop4): bad geometry: block count 4294836288 exceeds size of device (68 blocks) 09:31:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600332f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:31:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000000004200002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:31:01 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080000000000d0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x7a00}, 0x0) 09:31:01 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000400683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600342f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:31:01 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000500683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2134.232655][T22890] loop5: detected capacity change from 0 to 264192 [ 2134.275141][T22890] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2134.275822][T22916] loop4: detected capacity change from 0 to 545 [ 2134.280906][T22890] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2134.293328][T22916] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2134.303326][T22916] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2134.313070][T22916] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2134.336983][T22916] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2134.338577][T22890] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2134.350913][T22916] EXT4-fs (loop4): get root inode failed [ 2134.364040][T22916] EXT4-fs (loop4): mount failed [ 2134.373572][T22890] loop5: p5 size 11290111 extends beyond EOD, truncated 09:31:02 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201823b00ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:31:02 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080000000000e0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x8100}, 0x0) 09:31:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600352f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:31:02 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000600683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2134.381639][T22890] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:31:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000042000000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:31:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600362f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:31:02 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000110000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2134.474121][T22954] loop4: detected capacity change from 0 to 545 [ 2134.486864][T22955] loop5: detected capacity change from 0 to 264192 [ 2134.498276][T22954] EXT4-fs (loop4): bad geometry: block count 1107296320 exceeds size of device (68 blocks) 09:31:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0xc00e}, 0x0) 09:31:02 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000700683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0xff5c}, 0x0) 09:31:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000002030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2134.542809][T22955] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2134.550399][T22955] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2134.582410][T22955] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2134.606985][T22955] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2134.639222][T22955] loop5: p6 size 1914664839 extends beyond EOD, truncated [ 2134.645808][T22987] loop4: detected capacity change from 0 to 545 09:31:02 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201823c00ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:31:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600372f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:31:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x34000}, 0x0) 09:31:02 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000800683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:02 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000120000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000003030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) [ 2134.675438][T22987] EXT4-fs (loop4): bad geometry: block count 33554496 exceeds size of device (68 blocks) 09:31:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x400300}, 0x0) [ 2134.770218][T23016] validate_nla: 157 callbacks suppressed [ 2134.770235][T23016] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2134.783360][T23019] loop4: detected capacity change from 0 to 545 [ 2134.786313][T23018] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2134.805921][T23019] EXT4-fs (loop4): bad geometry: block count 50331712 exceeds size of device (68 blocks) 09:31:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x1000000}, 0x0) 09:31:02 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000900683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:02 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000200000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2134.814564][T23006] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2134.826744][T23024] loop5: detected capacity change from 0 to 264192 [ 2134.841449][T23006] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2134.860420][T23024] loop5: p1 p2 < > p3 p4 < p5 p6 > 09:31:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600382f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2134.865704][T23024] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2134.874301][T23024] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2134.882896][T23024] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2134.891133][T23024] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:31:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000004030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:31:02 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201823d00ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) [ 2134.916367][T23042] netlink: 'syz-executor.3': attribute type 27 has an invalid length. 09:31:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x2000000}, 0x0) 09:31:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x3000000}, 0x0) [ 2134.983469][T23046] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2134.993043][T23049] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2135.019150][T23053] loop4: detected capacity change from 0 to 545 09:31:02 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000a00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:02 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000250000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x4000000}, 0x0) [ 2135.030217][T23061] loop5: detected capacity change from 0 to 264192 [ 2135.043880][T23065] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2135.062078][T23053] EXT4-fs (loop4): bad geometry: block count 67108928 exceeds size of device (68 blocks) 09:31:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x5000000}, 0x0) [ 2135.083704][T23049] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2135.092781][T23071] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2135.114903][T23061] loop5: p1 p2 < > p3 p4 < p5 p6 > 09:31:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000005030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:31:02 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000b00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:02 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000480000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2135.133576][T23061] loop5: p1 size 11290111 extends beyond EOD, truncated 09:31:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600392f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:31:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x6000000}, 0x0) [ 2135.176704][T23061] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2135.202207][T23086] loop4: detected capacity change from 0 to 545 [ 2135.215081][T23061] loop5: p5 size 11290111 extends beyond EOD, truncated 09:31:02 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201823e00ff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:31:02 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000c00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:02 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080000000004c0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000006030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:31:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x7000000}, 0x0) [ 2135.223632][T23061] loop5: p6 size 1914664839 extends beyond EOD, truncated [ 2135.241989][T23086] EXT4-fs (loop4): bad geometry: block count 83886144 exceeds size of device (68 blocks) 09:31:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06003a2f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:31:03 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000d00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:03 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080000000974c0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2135.366899][T23124] loop5: detected capacity change from 0 to 264192 [ 2135.390018][T23126] loop4: detected capacity change from 0 to 545 09:31:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x8000000}, 0x0) 09:31:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06003b2f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 2135.412080][T23126] EXT4-fs (loop4): bad geometry: block count 100663360 exceeds size of device (68 blocks) [ 2135.434765][T23124] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2135.445551][T23124] loop5: p1 size 11290111 extends beyond EOD, truncated 09:31:03 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000600000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2135.461518][T23124] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2135.471192][T23124] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2135.480042][T23124] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:31:03 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000e00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:03 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="02018202ffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:31:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000007030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:31:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x9000000}, 0x0) 09:31:03 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000680000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06003c2f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:31:03 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000001000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:03 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080000000006c0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2135.601794][ T1033] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2135.607977][ T1033] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2135.616004][ T1033] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2135.624081][ T1033] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2135.631942][ T1033] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:31:03 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000001100683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2135.679265][T23176] loop4: detected capacity change from 0 to 545 [ 2135.689494][T23176] EXT4-fs (loop4): bad geometry: block count 117440576 exceeds size of device (68 blocks) 09:31:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000008030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:31:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0xa000000}, 0x0) 09:31:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06003d2f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:31:03 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000001200683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2135.752913][T23198] loop5: detected capacity change from 0 to 264192 09:31:03 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="02018203ffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:31:03 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000740000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06003e2f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:31:03 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000002500683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2135.797987][T23198] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2135.803261][T23198] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2135.810881][T23198] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2135.819091][T23198] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2135.826774][T23198] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:31:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0xb000000}, 0x0) 09:31:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0xc000000}, 0x0) [ 2135.866112][T23218] loop4: detected capacity change from 0 to 545 09:31:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0xd000000}, 0x0) 09:31:03 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a60080000000007a0000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2135.916171][T23218] EXT4-fs (loop4): bad geometry: block count 134217792 exceeds size of device (68 blocks) [ 2135.967669][T23239] loop5: detected capacity change from 0 to 264192 09:31:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000009030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:31:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06003f2f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:31:03 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000004800683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:03 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a600800000004c970000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2136.021128][T23239] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2136.027836][T23239] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2136.036837][T23239] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2136.046638][T23239] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2136.060105][T23239] loop5: p6 size 1914664839 extends beyond EOD, truncated [ 2136.141756][T23264] loop4: detected capacity change from 0 to 545 [ 2136.169878][T23264] EXT4-fs (loop4): bad geometry: block count 150995008 exceeds size of device (68 blocks) [ 2136.203385][T23239] loop5: detected capacity change from 0 to 264192 09:31:03 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="02018204ffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 09:31:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0xe000000}, 0x0) 09:31:03 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000004c00683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600402f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:31:03 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000400300683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004000000a030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x22100}], 0x3, &(0x7f0000002a00)=ANY=[@ANYBLOB='\x00']) 09:31:04 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000006000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2136.251751][T23239] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 2136.259147][T23239] loop5: p1 size 11290111 extends beyond EOD, truncated [ 2136.266954][T23239] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 2136.275872][T23239] loop5: p5 size 11290111 extends beyond EOD, truncated [ 2136.284951][T23239] loop5: p6 size 1914664839 extends beyond EOD, truncated 09:31:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0600412f000000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 09:31:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32, 0x2b9}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x10000000}, 0x0) 09:31:04 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001100fff1fefefd956f76c9b724a6008000000000034000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 09:31:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$netli