', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000b00005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000040200000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:31 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1001200) 01:10:31 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000001800005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000300000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1654.285113][ T577] loop1: detected capacity change from 0 to 140 [ 1654.299205][ T577] EXT4-fs (loop1): Invalid log cluster size: 72 01:10:31 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1002700) 01:10:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b0000000500000001000000000000004c000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:31 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x240840) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000001c00005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000000225c17d0300000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:31 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x100002, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f00000000c0)={0x57, 0x14a1, 0x6, {0x9327, 0x3}, {0x2ef6, 0x2}, @period={0x59, 0x4, 0x1, 0x3, 0x8, {0x40, 0x2, 0x3}, 0x2, &(0x7f0000000040)=[0x0, 0x0]}}) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x1) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r3, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="020026bd7000ffdbdf2541000000080001007063550011000200303030303a30303a31302e30000000000d0087006c325f64726f7073000000000e0001006e6574646576fcffffff00000f0002006e657464657673696d3000000d0087006c325f64726f707300000000"], 0x70}, 0x1, 0x0, 0x0, 0x4}, 0x0) 01:10:31 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1003f00) 01:10:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000002000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000400000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1654.463117][ T631] loop1: detected capacity change from 0 to 140 [ 1654.491315][ T631] EXT4-fs (loop1): Invalid log cluster size: 76 [ 1654.547336][ T631] loop1: detected capacity change from 0 to 140 [ 1654.556713][ T631] EXT4-fs (loop1): Invalid log cluster size: 76 01:10:31 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.pending_reads\x00', 0x4000, 0x8) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$EVIOCGKEYCODE_V2(r2, 0x80284504, &(0x7f0000001280)=""/250) write$binfmt_misc(r0, &(0x7f0000001440)=ANY=[@ANYBLOB="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"], 0x1004) fallocate(r0, 0x2b, 0x4, 0x400005) 01:10:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000500000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:31 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1004000) 01:10:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000002600005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000060000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000003f00005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000600000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:31 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x2000000) [ 1654.693042][ T671] loop1: detected capacity change from 0 to 140 01:10:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000004000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:31 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0xfffffffffffffffc, 0xc4000) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) [ 1654.741563][ T671] EXT4-fs (loop1): Invalid log cluster size: 96 01:10:31 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x3000000) 01:10:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000040600000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000048000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1654.794850][ T671] loop1: detected capacity change from 0 to 140 [ 1654.810345][ T671] EXT4-fs (loop1): Invalid log cluster size: 96 01:10:31 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003e00e5eadcf28d8cd9b0a3bdff789b430100"}) fallocate(r0, 0x0, 0x0, 0x400001) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r3, 0xffffffffffffffff, 0x2) fgetxattr(r3, 0x0, 0x0, 0x0) r4 = accept4$unix(r2, &(0x7f00000000c0)=@abs, &(0x7f0000000240)=0x6e, 0x80000) r5 = dup3(r3, r4, 0x80000) r6 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) fgetxattr(r6, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[r1, r1, 0xffffffffffffffff, 0xffffffffffffffff, r5, 0xffffffffffffffff, 0xffffffffffffffff, r0, r6], 0x9) r7 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r7, 0xffffffffffffffff, 0x2) fgetxattr(r7, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r7, &(0x7f0000000040)={0x80000000}) 01:10:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000700000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000068000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000005a500005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:31 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x5000000) 01:10:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000800000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000fffe00005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:31 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x40041) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:31 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x8800000) [ 1654.929989][ T717] loop1: detected capacity change from 0 to 140 [ 1654.963886][ T717] EXT4-fs (loop1): Invalid log cluster size: 104 01:10:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000feff00005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000a00000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:31 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x2) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) fallocate(r0, 0x34, 0x0, 0x10) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000100)={0x65, 0x1a, 0x7, 0x20, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) ioctl$F2FS_IOC_GET_FEATURES(r1, 0x8004f50c, &(0x7f00000000c0)) memfd_create(&(0x7f0000000040)=':.!,\x00', 0x92b604741348d0e6) 01:10:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000c01801005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1655.036735][ T717] loop1: detected capacity change from 0 to 140 [ 1655.058440][ T717] EXT4-fs (loop1): Invalid log cluster size: 104 01:10:32 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x3f000000) 01:10:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b0000000500000001000000000000006c000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000b00000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000008005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:32 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x7fffffffffffffff) 01:10:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000001800000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000400008005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:32 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000240)=""/251) [ 1655.171581][ T767] loop1: detected capacity change from 0 to 140 [ 1655.206069][ T767] EXT4-fs (loop1): Invalid log cluster size: 108 01:10:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000020005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:32 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) r2 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) write$eventfd(r2, &(0x7f0000000040)=0x100000001, 0x8) fallocate(r0, 0x0, 0x0, 0x1000000) 01:10:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000001c00000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1655.264501][ T767] loop1: detected capacity change from 0 to 140 [ 1655.271378][ T767] EXT4-fs (loop1): Invalid log cluster size: 108 01:10:32 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r2, 0xf505, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x2c502, 0x142) sendmsg$AUDIT_DEL_RULE(r3, &(0x7f0000000780)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)={0x52c, 0x3f4, 0x400, 0x70bd2b, 0x25dfdbfc, {0x0, 0x1, 0x34, [0x4, 0x9, 0x48bb, 0x6, 0x8, 0x5, 0x0, 0x3, 0x3, 0x3f, 0x6, 0x0, 0x2, 0x1, 0x80000001, 0x7, 0x1, 0x0, 0x9, 0x6, 0x1, 0x7, 0x7fffffff, 0xda8c, 0x4, 0x3f, 0xe8, 0x8, 0x0, 0x3, 0x2, 0x9, 0x8a, 0x0, 0x7, 0x3, 0x100, 0xffffffff, 0x2, 0x433, 0x80000000, 0x1, 0xfffff6da, 0x6, 0x3ff, 0x4, 0xe6b0, 0x2, 0x0, 0x7fffffff, 0x1, 0x2, 0xffffffff, 0x7, 0xc055, 0x6, 0x4, 0x7, 0x8, 0x2, 0x0, 0x4, 0x40d, 0x8], [0xc5, 0x5af, 0xffffffff, 0x2, 0x6, 0x40f000, 0x2, 0x1, 0x2, 0x5, 0x35a7, 0x80000001, 0x9, 0x7, 0x0, 0xfffff801, 0x3, 0x0, 0x7fffffff, 0x8, 0x9, 0x6, 0x40, 0x3f, 0x5, 0x307, 0xfff, 0x20, 0x3, 0x0, 0xffff8001, 0x6, 0x3ab, 0x80000000, 0x7, 0x1, 0x3, 0x5, 0x2, 0x4, 0x8, 0x0, 0x8fdf, 0x3, 0xfffffff7, 0x81, 0x1, 0x9, 0x2, 0xf5c, 0x8, 0x37000000, 0xfff, 0x8, 0x3f, 0x2, 0x4, 0x7f, 0xe10, 0x6, 0x6, 0x0, 0x7, 0x4], [0x40, 0x4, 0x7, 0x620d, 0x7, 0x5, 0x1ff, 0x5, 0x4bd1, 0x1, 0x5, 0x101, 0x8000, 0x3, 0x2, 0x7, 0xf6bd, 0x2facab19, 0x4a, 0x6, 0xe0, 0x7, 0x6, 0x7, 0xffff5a07, 0xffffffff, 0x7fff, 0x8, 0x9e, 0x3, 0x5, 0x3, 0x4, 0x6, 0x9, 0x8, 0xfffffffe, 0x87bd, 0x1, 0x1567, 0x7fff, 0x7f, 0x3ff, 0x7ff, 0x5, 0x1216, 0x8, 0x80000000, 0x400, 0x6, 0x20, 0x8, 0x3f, 0x1, 0x882e, 0x8001, 0x2e31, 0xe3b, 0x4f5, 0x9, 0x53c8, 0xffff92cf, 0x7, 0x1ff], [0x5, 0x0, 0x7f, 0x1ff, 0x1, 0x7, 0x831, 0x3, 0x7, 0x3ff, 0x30, 0x6, 0x2, 0x622, 0x3, 0x7, 0x6, 0x7, 0x5, 0x1, 0x3f, 0x8, 0x4, 0x2, 0x6, 0x1, 0x7, 0xca, 0x7, 0x401, 0x3, 0x0, 0x80000001, 0xfffffffd, 0xffff, 0x4, 0x80000001, 0x99, 0x3ff, 0x6, 0xffffff98, 0x0, 0x0, 0x80000000, 0x1, 0x3, 0x6, 0x2, 0x0, 0x101, 0x800, 0x81, 0xfffff139, 0x800, 0x7, 0xa041, 0x9, 0x2, 0x0, 0x3f, 0x3f, 0x5, 0xfb, 0xe89], 0x10b, ['\x00', '\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', '!^#!\x14\x00', '!/}!\x00']}, ["", "", "", "", "", "", "", ""]}, 0x52c}, 0x1, 0x0, 0x0, 0x4004}, 0x20008810) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000040005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b000000050000000100000000f79e3e6e000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000002600000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000015178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:32 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000080)={{0x2, 0x0, @empty}, {0x0, @dev}, 0x0, {0x2, 0x0, @multicast2}, 'lo\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000000080), 0x89, 0x204c0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) syz_open_dev$evdev(&(0x7f0000000040), 0x6, 0x440100) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x240020, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x40284504, &(0x7f0000000100)={0x6, 0x7, 0x8001, 0xcc, "7af0a85d43dadd36b70d0bd0f4ccad5673bd4f3fddbb3e78a332deedb023abee"}) ioctl$EVIOCSCLOCKID(r3, 0x400445a0, &(0x7f0000000240)=0x2) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r2, 0xf50f, 0x0) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000003f00000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:32 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000040)) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1000000) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r3 = open_tree(r2, &(0x7f0000000100)='./file0\x00', 0x88001) r4 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r5 = fsmount(r4, 0x1, 0x70) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r5, &(0x7f0000000240)={0xe0000011}) close_range(r4, 0xffffffffffffffff, 0x2) fgetxattr(r4, 0x0, 0x0, 0x0) r6 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r6, 0xffffffffffffffff, 0x2) fgetxattr(r6, 0x0, 0x0, 0x0) close_range(r3, r6, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f00000000c0)={0x40000000}) [ 1655.398668][ T813] loop1: detected capacity change from 0 to 140 [ 1655.427519][ T813] EXT4-fs (loop1): Invalid log block size: 1050605312 01:10:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000025178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000074000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000004025178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000004000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1655.488848][ T813] loop1: detected capacity change from 0 to 140 [ 1655.495997][ T813] EXT4-fs (loop1): Invalid log block size: 1050605312 01:10:32 executing program 3: memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000200000001f00"}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x90000, 0x0) fallocate(r1, 0x0, 0x0, 0x400001) 01:10:32 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000040)=""/63) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1000000) 01:10:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000035178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:32 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000008004000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:32 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r1, 0x0, 0x9, 0x400001) fallocate(r0, 0x0, 0x0, 0x1000000) [ 1655.576285][ T855] loop1: detected capacity change from 0 to 140 [ 1655.609470][ T855] EXT4-fs (loop1): Invalid log cluster size: 116 01:10:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000045178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:32 executing program 3: kexec_load(0x400, 0x9, &(0x7f0000001700)=[{&(0x7f0000000080)="a91d3b229d12fa3bd736", 0xa, 0x4, 0xffff}, {&(0x7f0000000240)="b85184b6ce5773f8b4e843e88646cee3feebf6f52262657219c669f41d0c96b006fbf5f1e4882a9da50c7cba252af1442a4e59b34df38d7158bb766795b6c0038be582e7da0271027faab6e378bbb0e464bd3a11bf4ae9f1c09b38f7fb534b3d519369a6709f317338a624b957f34f43505f5dcf15eb51d846df660bd780491960e5b07be1ae5b19d09a222fdf04b5fdf0a599f96f1c561a34070a7f1f92a7ba5b75f7b0e18a587c5814987f6b871ca1666bc586e85e51d35cbf74a4edbb4ab6", 0xc0, 0x4, 0x8}, {&(0x7f0000000300)="39bde06db1008d7ecd999c87b367496770d2c03d6343a348ce1dc6a7316823d061866518d5b1ca1998372f85506ac82c40ed8acc9e166e28172ad472aa3e6f2711224d02c8a307a41e4121a59e7758f930ef3d834892722f32ea697e1710cc166561c59b058612b45d7beedd23272089a5cac1d0e1f736f4274afd1993f6a0c2afb04b31b1ace8285cc410ba7f0e4f9f8391ce2e6d34a49bf650", 0x9a, 0x8001, 0x1}, {&(0x7f00000003c0)="aabb330791d431288e3d03f814a4e95de9a24617afcf20931ac860e0f6365c24da059b3c45791d839efe60ddb18833b8b6b0d67c165cf3711f7a69da0c04634de14fca3470effba1974e93f5b22f5a77bca8eef82eed529cc03678faa13620f923d49fee27d080413abdda38d2e76c785ff1b9205f7b5a681e0dd082dc1d18f2a608f97215858823ed041b4317dd64f07126974ad3", 0x95, 0x0, 0x7fff}, {&(0x7f0000000480)="f99b76e9978de3ba4e805174b729d8f28c263e0d195edb3820609273477da7490fe17b9b7e67820118ab89ca51e56ba549c562e7cc455cab43dcbc0bb92df4889d1591eb48888b3125ba0ce902319ef7b437096e67523725c95fb12d582a9abe58b5aa07e139a16968399a05f7e4878f435da436e0aee2b367f53d3ff343113795d488078a96fab07f21e3811cdf0bb4070d3ec424d36716b911c216466eca75fabf6dd6f82c681acdb4175d97cdf451effba7a9951f5aee41e339028eb746d2943fd075ccb9a797b6c113011cd0750483fa08f76ba2701ac18f35c38d06", 0xde, 0x8001000000000, 0x8}, {&(0x7f0000000580)="0fa3879351ee6e9a21a3588c38e57d4929775984e81d30823a2fdfd2bc841c9368db284095c1db1231c6a19bbb31510236f6718f14daa55681ceadf95dc3d616904bc40fb612e3bf4ec8096631803b946a7ea3d5ce16ccaff9864936107bd37ae1441e5d10bfcf5b7099ad7e2783aff1a74fdf1859d680c7608227634da8449f885c8527d7cdbad4f89f022f043f2018ab41", 0x92, 0x1, 0x4}, {&(0x7f0000000640)="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", 0x1000, 0x100000001, 0xffffffffffffff28}, {&(0x7f0000001640)="8278950071d49d1856d13887447a16b3f2e95c4571f890e6bb7c7ea124fd054d09d4b7c001442bd97ac079de8535ff917d50bb3e5b91e4a452dccebd274412ed438e254a471ba84397149849abd595bda102776b3ad6e2b476cb7042ca7c6284d16dff8f629a58273fe351955758c3b9193a35ec456de2d2f61c5b6ab9337bcfc3d19df903f54398a1acc58c92923d222331e13fe1709bcf55978c09405de9fb7f532b59db8494ddd8620effbabb", 0xae, 0x80000001, 0x18}, {&(0x7f00000000c0)="6b19fa9ee59df0ecd3a29718fba9bb60ca73b2fa8e0ff077f3b7817c87faa61b997759efc7d13662547d005d01172b724ae983a0858dbc91", 0x38, 0x4, 0x401}], 0x30000) r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x2080c2) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000057700000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1655.663860][ T855] loop1: detected capacity change from 0 to 140 [ 1655.681407][ T855] EXT4-fs (loop1): Invalid log cluster size: 116 01:10:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000076000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:32 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1000000) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000240)) 01:10:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000055178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000048000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:32 executing program 3: memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1OTHP\xf4O\xe2\x9f\xd9\xae\xcf>/\x9fZw\xb3Y\x17*\t\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x937\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x5) syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fallocate(r0, 0x0, 0x0, 0x400001) unlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 01:10:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000065178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:32 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000)={[0x1]}, 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) close_range(r1, r2, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000077000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000004065178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1655.787410][ T903] loop1: detected capacity change from 0 to 140 [ 1655.808637][ T903] EXT4-fs (loop1): Invalid log cluster size: 118 01:10:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000000000ffffff8500000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:32 executing program 3: r0 = memfd_create(&(0x7f0000000400)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6bH\n\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\x9e`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84\xc1a$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x05f\xbb\xc8\x97/u~\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\rT\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\xe0\xb5\xf309\x96\xa5\x85]\xbaI]]\xfa20wP\x9c}\x18T\xc814\xac\x17\bU\x01\x00\x00\x00[|:=s\xa2F\x8b\xc9J)B\xa4\x19\xac\xa9\xc3\"\xbfQ\xe7 \x16#\xc3U\xf8\xe7\xff\xff\xff\x7f\xbd\x8e/\xad\x01v$\x9dr\x1d\xa5D\x84\xb7O\x9d\x8dJ\x1a3;\x03G\x92F`9*\x8f\x9f\v\xfavFWn%f$\v<\b\xccTD\x9fl<\b\x8b\x9712\xd1)|l\xee\x9b\x18*s\x95\xb5\xfe\x8d\x8d\x93\xda@J\xa5O\xb5H\xc2\x99-\xae\x95\xc3\xad\x04\xfb%2\x01\x1eOq/4\x19\xe77@\xfe\x11\xdf\xa2e\xd6\x9cm\\ \x1bm|\xcb\xae\xbc\xc2IG\x9b\x05\x9bI\xbf^\xde\xed\xe5\xb1g\xf8\x1a)\x9b\xfe\x154\x8a\xdf\x9dY\x8b\xff\xae~A\xc9b\xfe\x8e\xf2G\x91n\xf7,\xe9\xb9N\xf2\xca\xb1\xa21\xd16\xa3\x00\xae|\xf0\x887.\x0e\x8d\x9eY\r\n\xef\x87\xd2\xed\x98\xcb5?\x81\xc9\xdb\xeeyw\x00S\x81\x9d\x9c\x01\xda*\xfd\xdfw\xd2\xa7t\xa0\x92\xdf2(\xd9\x1a\xee\x8b\x93Y2-\xb2zR \xe1hF=\xef-p&\xd6\xaa\xe9B\xf1\x05@\xa6\x97\x833\xeaC\xe8\x9e\xc8\x1f\n]\x97\x05\xa8\xc3\x06)\x7f\x840l\r/\xdbt\xba\xce\xe2v?\xd7\xb8N\xf1\xb4{\xd5\xd0\x8f\x13x\xcb\xbbp\xbdDr\xe8\xb52\x89\x1d/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x7, 0x7, 0x24, "ed0054d8c300e13dc13e1f55d5576500a8f70d01080000e8000000f900"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1000000) 01:10:32 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r1, 0x8010661b, &(0x7f0000000040)) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) [ 1655.899051][ T927] loop1: detected capacity change from 0 to 140 01:10:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000fffffffffffffdef00000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000085178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1655.942019][ T927] EXT4-fs (loop1): Invalid log cluster size: 119 01:10:32 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x7) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) ftruncate(r0, 0x5) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x2010, r1, 0x3dc2f000) 01:10:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000000000fffffff600000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1655.986331][ T927] loop1: detected capacity change from 0 to 140 [ 1655.993583][ T927] EXT4-fs (loop1): Invalid log cluster size: 119 01:10:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b0000000500000001000000000000007a000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="0000000000000000000000000000000000000000000000000000000a5178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:32 executing program 4: r0 = memfd_create(&(0x7f0000000240)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x01\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6H4\xc5B:O\x92\x83\x14\xda\xe2V\xecp\xb3\xc2\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5\x06\x00\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x2) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1000000) 01:10:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000000000fffffdfc00000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:32 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2a\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e%k\x12\xdf\xb9q\xb6^r\xd4\xb5X\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T\x00\x00\x00', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x40284504, &(0x7f0000000040)={0x6, 0x10, 0x4, 0x10000, "c24c1091c8e08a0a6805a323a8c3ae7170d6e4f47fc35c000000000000008020"}) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r3, 0xffffffffffffffff, 0x2) fgetxattr(r3, 0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x9, 0x1, 0x6, 0x0, 0x0, 0x6, 0x4000, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10000, 0x100000001, 0x5, 0x5, 0x5e80000000000, 0x8, 0x400, 0x0, 0x7, 0x0, 0x80000000}, 0xffffffffffffffff, 0x8, r2, 0x3) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000380)=[{{0x77359400}, 0x12, 0x7ff, 0x2}, {{}, 0x1f, 0xf94, 0xffff}], 0x30) r5 = epoll_create1(0x0) ppoll(&(0x7f0000000100)=[{r3, 0x8}, {r4, 0x618}, {r2, 0x4020}, {r5, 0x1300}], 0x4, &(0x7f00000002c0), &(0x7f0000000300)={[0xcb22]}, 0x8) r6 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r6, 0xffffffffffffffff, 0x2) fgetxattr(r6, 0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r6, 0x400c6615, &(0x7f0000000340)={0x0, @aes256, 0x0, @desc3}) fallocate(r0, 0x0, 0x0, 0x400001) [ 1656.095783][ T972] loop1: detected capacity change from 0 to 140 01:10:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000000000fffffdfd00000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="0000000000000000000000000000000000000000000000000000000b5178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1656.138580][ T972] EXT4-fs (loop1): Invalid log cluster size: 122 01:10:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b0000000500000001000000000000007e000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000000000fffffffe00000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000185178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:33 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x1c, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x10, 0x0, 0x400001) [ 1656.255522][ T997] loop1: detected capacity change from 0 to 140 [ 1656.292035][ T997] EXT4-fs (loop1): Invalid log cluster size: 126 01:10:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000fffffffffffffffe00000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="0000000000000000000000000000000000000000000000000000001c5178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1656.356015][ T997] loop1: detected capacity change from 0 to 140 [ 1656.373620][ T997] EXT4-fs (loop1): Invalid log cluster size: 126 01:10:33 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) fcntl$addseals(r0, 0x409, 0x1) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000265178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000000000ffffffff00000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b0000000500000001ffffffffffffff7f000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:33 executing program 3: r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001380), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_PMK(r0, &(0x7f00000014c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001480)={&(0x7f00000013c0)={0x8c, r1, 0x300, 0x70bd2b, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x8c}, 0x1, 0x0, 0x0, 0x8000050}, 0x10000000) memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) r3 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2, 0x30, 0xffffffffffffffff, 0x8000000) syz_io_uring_setup(0x40, &(0x7f0000001300)={0x0, 0xb51c, 0x8, 0x2, 0x2bb}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000040), &(0x7f0000000240)=0x0) syz_io_uring_setup(0x184, &(0x7f00000002c0), &(0x7f0000148000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000340)=0x0, &(0x7f0000000100)=0x0) r7 = syz_io_uring_setup(0x2fb4, &(0x7f0000000280), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000300), &(0x7f0000000340)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x11c, &(0x7f00000012c0)=0x1, 0x0, 0x4) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000200)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r8}}, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000001280)=@IORING_OP_WRITE={0x17, 0x4, 0x2000, @fd_index=0x3, 0x80, &(0x7f0000000280)="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", 0x1000, 0x4, 0x1, {0x0, r8}}, 0x80) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) 01:10:33 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(r2, 0x40044581, &(0x7f0000000040)=0x194) fallocate(r0, 0x0, 0x0, 0x1000000) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) write$evdev(r1, &(0x7f0000000240)=[{{}, 0xf9ee7fccef34ca70, 0x8001, 0x3}, {{0x0, 0xea60}, 0x1, 0x7f, 0x8}, {{r3, r4/1000+10000}, 0x5, 0x51, 0x6}, {{0x77359400}, 0x1f, 0x7f, 0x7e}, {{r5, r6/1000+60000}, 0x4, 0x4, 0x2}, {{0x0, 0xea60}, 0x5, 0x9, 0x10000}, {{0x0, 0x2710}, 0x14, 0x8001, 0x5}, {{}, 0x3, 0x401, 0x89}], 0xc0) r7 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r7, 0xffffffffffffffff, 0x2) fgetxattr(r7, 0x0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r7, 0x40284504, &(0x7f0000000300)={0x80, 0x1, 0x4b56, 0xfffffff7, "620f1f99ca26c9b18c1a224c38f3125dc940076681925a9de47e677664b1aa62"}) mmap(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x2000000, 0x2010, r7, 0x3b61f000) 01:10:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000007ffffffffffff00000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="0000000000000000000000000000000000000000000000000000003f5178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1656.569403][ T1045] loop1: detected capacity change from 0 to 140 [ 1656.608556][ T1045] EXT4-fs (loop1): Invalid log block size: 4294967295 01:10:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000effdffffffffffff00000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1656.663947][ T1045] loop1: detected capacity change from 0 to 140 [ 1656.673696][ T1045] EXT4-fs (loop1): Invalid log block size: 4294967295 01:10:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000405178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000feffffffffffffff00000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b000000050000000100000000ffffff85000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:33 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x8c6c1) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r4 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r4, 0xffffffffffffffff, 0x2) fgetxattr(r4, 0x0, 0x0, 0x0) close_range(r3, r4, 0x0) fgetxattr(r3, 0x0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x40284504, &(0x7f0000000100)={0x9, 0x9d, 0x2, 0x3ff, "a68d22887b5a62f68d9c5d06045ad561c04ea28aa8d1aa8f7ed55d46dedea4f2"}) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) copy_file_range(r1, &(0x7f0000000040)=0x3, r2, &(0x7f00000000c0), 0x4, 0x0) 01:10:33 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) memfd_create(&(0x7f00000000c0)=']+&-/&.\'\x00', 0x2) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x20, 0x0, 0x21, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r3, 0xffffffffffffffff, 0x2) vmsplice(r2, &(0x7f0000000740)=[{&(0x7f0000000240)="cfd7649a9e9c1befff99190ec39b2513c8d9299af07ec8e60ea184fecdf5139d85e424f2529e0325379abda16fed694c879873949e02e1b057d63a64a9814759d56dbb0110bfebf71342dce5f31c2b91585285db7dd72d5769edcd9bc889e677466e0586356611806b4017", 0x6b}, {&(0x7f00000002c0)="56eb43caf1ece75760822dfb357606a78881ed099d62660527c6cbf23c54a6b2685dd244112279288c8b127f4e58aceaa870653e2e780d3427ad1aeb82017f204b471738723a8411cf6a8691b20ba2f7916edb91b51895a14274e7a99e34aead2e76385ae323dae2b6168507fb11e20650d1f4f55df34809692d952acbbd83626af47c17ef60777f28b07d58a8423129b6b1e86e4ad51349fd9436a4663e5149157a39f7125927433d3b6854af", 0xad}, {&(0x7f0000000380)="09238990c571c6ea85c3129ae7d466a625c28f8968a14431362fbe874d7564eadf0ddb51a0f08e5657daed478928e03768375a9dabaef2e5a080313bbfa9e2a04d9123f7adf79d701663d20c01060cd08e15e2dae01722a78bf70d0e50761770175d372d471ba11c589ec616a99a053b698964855c0806a6d90a6facbdca1c594db75c5cc4e27d4ac2fdf43c08809ec4eb890413fa754bd383d0d50406046f36a0bbcd741f5a082f870a5fdc9215e37453d84d6e96086e2ae85f66281c05fd5c7f8faf23c17a631be859d9026a3030", 0xcf}, {&(0x7f0000000480)="5e32cdd5c46fc421ebee48cfb165af70bc111d98e1e72993cc3c5ff551d83f4cf04a8c81e339d9ee1521cb0bf69b2899197ba7f972c6781aca4f4c0f1084fce24cd39307a423801ef24da0d198dda872a3f5e93d455ea97204eb8d9a93d0dc1ab3a7eddbfc57ff85d07ce7cddf80a3370fbf38494a0ed4a0194a4a824407b3156a4c919d7665572404560acffc1f6e13fa06cd33b626cdc291cab0bf6481bc9ef5abc1e51d82ccb075017a521c4c", 0xae}, {&(0x7f0000000540)="1f866dc8f29ded4d4c92b1e647eaa509e23741b9aaa12ceac1d7d10a843c32f70a9930db5c54ee10ec4766b2c621e385bf6107b269b2b405945298bd6cf640e2ead0fc0e95f0b451a37cc2b866ba52d4c0463ba2efa7fbd9285a161bd97e4cec8dabdb0aec1cdf0d6defc8effcacc6a92f4ca1a9b151b0257e4702ede2461bdda563222226aec198b3557ab9241261f4fc9e81db29ddfd22c5602e156056f0d8a9c7db110e511548be0b233303d2258a925660bd6e0e26cbad2ebec44a81c488fd7c0024faec362937bb3916f4fadd2e21185f8c88493df4c93300524e2b3ca62fbd5887fb2969bfec2b707521e2fd9d62a71165ec568b", 0xf7}, {&(0x7f0000000100)="15aa438f98f0969b4f3c755db9f7ff2a5b8a8483efdca2ce78526972ce280cf5745133d80d9cb6d9d5b2d00e7438ecc8e3a2989a1e0cd822bcd7665361fd60", 0x3f}, {&(0x7f0000000640)="c9235811cdda02230b0879cbae2f57d426f65ac53ff3d7a3e7a05f610f6d981b051d17af98a3c38565ed9c37e1a9f9db06628360e703f7af8dbcf2e314725ffe8fb77a3bc88a54d130bbb08cb7942a7740bb948974aed14c0b8514e9b4b953d738b4c184b576029dc482b7008cf6913cfd0fb523a67f8c4bd6303c04918ebc88e2738e36a72b3848e601da622ba37f970496710f157e603afee90257f442b2d53f8e1458d61b8b2605a3138c40d843854f3177103937627b081a1cb65fbdc44e1e9385f386a0ed6f0e5f5b76d779d3e5875d4240dd71", 0xd6}], 0x7, 0xd) fgetxattr(r3, 0x0, 0x0, 0x0) sendfile(r2, r3, &(0x7f0000000040)=0x401, 0xe8) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1000000) 01:10:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000800405178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000ffffffffffffffff00000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1656.804723][ T1086] loop1: detected capacity change from 0 to 140 [ 1656.824945][ T1086] EXT4-fs (loop1): Invalid log block size: 4294967040 01:10:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000004805178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:33 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb65\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9e\x01\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\xa2t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd5\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T\x00\x00\x00\x00\x00\x00\x00', 0x0) memfd_create(0xfffffffffffffffc, 0x1) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x5, 0x100) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x7, 0xc) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) dup3(r0, r1, 0x0) 01:10:33 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) fsetxattr$security_ima(r1, &(0x7f0000000100), &(0x7f0000000340)=@ng={0x4, 0x11, "9bebd6cdea6d2403da09d9"}, 0xd, 0x2) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x3f, 0xff, 0x0, 0x24, "edf253f5000000003ea03e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1000000) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r3, 0xffffffffffffffff, 0x2) fgetxattr(r3, 0x0, 0x0, 0x0) pwritev(r3, &(0x7f00000000c0)=[{&(0x7f0000000240)="78e55b79d934b933406c41b1107d5351abecdfd5e3ae667267ba1f6f7c6dbc24bb8a825ae9b16c8680a8beb49bbc68ff354a6b7d9e514941812b9701fd11ac8b1a93cc3f442ea682cb16c5d2377549939e4595d18137008712cb236ebbcf094d1758f5db495994730e50dc9c3c6b91e409902a8413a4bbfa3ae26e84db9e1d3cab7520910218c04353d387edcf16fd6a52e9a6937fbb5586ced39bcee48db2904cadf86cf73b439f6d6017a41d566225a879a2e2f4e510b5c7e2156549ab5bdfa2417c47043d4b0acfac7601fedb8db732ae85cdebabb2d2921dafb14bd02df398fc087e6340e627", 0xe8}], 0x1, 0x1, 0x9c1) close_range(r2, 0xffffffffffffffff, 0x2) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r1, 0x40089413, &(0x7f0000000040)=0x4) io_uring_enter(r3, 0x7931, 0x333a, 0x0, &(0x7f0000000380), 0x8) fgetxattr(r2, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) 01:10:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000ffffff855178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000200000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1656.903536][ T1086] loop1: detected capacity change from 0 to 140 [ 1656.911972][ T1086] EXT4-fs (loop1): Invalid log block size: 4294967040 01:10:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b000000050000000100000000ffffff8c000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:33 executing program 3: getxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=@random={'trusted.', '\x00'}, &(0x7f00000002c0)=""/36, 0x24) getsockname$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @private}, &(0x7f0000000100)=0x10) r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) r2 = dup(r0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000040)={0x5, 0x13, 0x9, 0x5, "4c6749633806cb916571599735bb5ab6419c774de27e057c46383072f8da7484"}) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000005a55178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000300000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:33 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1000000) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000240)={'batadv_slave_1\x00', &(0x7f00000000c0)=@ethtool_perm_addr={0x20, 0x63, "95f3f4640d71a24b9817bc39ba884804fd8474fef8636fdf18f3d4e138101a020256f42aa70dba7af602df490ef15b5b486500beb6610b20300e59039b3ce335340d625a6b1f25ecd89931b8b3c14fb71bf04aa6a88ef78600521aa57b2842fe785d70"}}) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x1000) [ 1657.016200][ T1135] loop1: detected capacity change from 0 to 140 [ 1657.026097][ T1135] EXT4-fs (loop1): Invalid log block size: 4294967040 01:10:33 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4, 0x4010, r2, 0xaf554000) fallocate(r0, 0x0, 0x0, 0x400001) openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x801, 0x0) 01:10:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000118c05178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000400000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000093000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:34 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) vmsplice(r2, &(0x7f0000002640)=[{&(0x7f0000000240)="51707ca1e052d09b91b8a753354452f271d5c1cf2de59b694b5d81486814ec15c6c5cf5126d5073fcee47cbe5c4d788feb3f6f25e437885a2128c75a66365e39cf259c80c39ecdfbf5bdef8326bebf14ac8f1220ef004b60a47fcae468e198e25b2c60bdc91c0bfd831f8601b66ea00b04fb911ce1601abc80c6849dfe28682a69ada010e8e06a98f43a419b14286b3f4408457ac7d4f43d2d75ac1f6bde9e935fbc8c164ba57a158404082c", 0xac}, {&(0x7f0000000300)="409edcf20c8040c11072c3de90b7bc22dc7857d5710f936b18ec0d398f2253e9d4d75839daa47f6d4a55e91a95a2161c7bc7f8d6c51698b4e7fc0ccc34dbeccecdf2cac29f9fd028743b8035adb8cf093846ff3606bf35841b7fc1f5385eade1c47c7f63149de9d034dc77df00f0f6c18217ca55f2f496fadb647a9752322eca71434176289a48171051faebb3ffa0715332e47e0d658d8a92188c36996057b384a7a4cdf119613988778ce3c0e431887a5bbdad7836a9fff45a2fafe48054b865cdc8516498d3f6011ed2fb", 0xcc}, {&(0x7f00000000c0)="e2d892b1fa6d2b614d89509ac0794a277a3a753e845f070026c11510a6e1", 0x1e}, {&(0x7f0000000400)="3e2da96dc46b3fc707819136cf02b27d62f4e83b3da4aad7505a048fdfcb4bbc1b46a02a86e8f992e21243ac4125aab086e9eafa210a2650a5d375553e8ca7c7e8cc3bc818f398534e8366041d98f90a4622d4b351bc1977fdf5ee68287d40ed8d8353d6e2cfae", 0x67}, {&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001480)="fef659b2ccb16c27e2da6ce7acdaa7d85936a0393cd9e7b8bda13bb72c9f6a032aa1539bd82294e4bbadb5f04a5570d96f819fe51292d8ff1fb705a03dbe7f77c07279842a4881d1ae05b3d9c41680ff12e5afebbb3fad8c6894d71af7e1a2224cbcd4c597d07230df41182f61142ea9de27fa8a9a345981423d5b48", 0x7c}, {&(0x7f0000000100)="862e2212ca3ec416d9c317bbe25ad4cf6705c8ddc96595efab32de1271f0550e60ee537f85cb4260071da838af5c54ad", 0x30}, {&(0x7f0000001500)="ec802799c6789807a920736c545d1b91e722e93e160b8d6ed8439cdfeecab89fb649daeab5fa50b9cadc85029cf38dde3b10a11ffcdbd56ae8b55e7cdfcc037c0e01dfb66def7d030c3f52bafcd2e43edd71cb7c991761a1a9c3dae0be1c848168cd3dd31f166812c9712b32643d34d88e40b5733a0cf6c2c593f2a59dfda8d647b1ca38188197d4ba67f82dd3fbf4cb316c276ae8f396ed8ef3b54b81517e993be9565c991e0b6f5174066001c556c86bddf5bc56870754721a84e8d429995fc332601a9569a881886810f7b9cdc600a4a8e4cfcfd2377d568f", 0xda}, {&(0x7f0000001600)="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", 0x1000}, {&(0x7f0000002600)="bfacbadd31f958c018c6d32dc53fbfd7", 0x10}], 0xa, 0x1) clock_gettime(0x0, &(0x7f0000002700)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000002740)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000002780)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000027c0)={0x0, 0x0}) write$evdev(r1, &(0x7f0000002800)=[{{}, 0x12, 0x1, 0x3f}, {{0x0, 0x2710}, 0x15, 0x7fff, 0x57b}, {{r3, r4/1000+60000}, 0x3, 0x5, 0x6}, {{r5, r6/1000+10000}, 0x2, 0x7ff, 0xf890}, {{0x0, 0xea60}, 0x0, 0x4, 0x5}, {{r7, r8/1000+10000}, 0x14, 0x9, 0x9}, {{r9, r10/1000+10000}, 0x9, 0xf529, 0x46}, {{}, 0x15, 0xb67e, 0x401}], 0xc0) fallocate(r0, 0x0, 0x100, 0x8) socket$netlink(0x10, 0x3, 0xc) 01:10:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000500000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000fffffff65178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:34 executing program 4: ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000040)) r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) r2 = syz_open_dev$vcsu(&(0x7f00000000c0), 0x0, 0x200000) ioctl$EVIOCSKEYCODE_V2(r2, 0x40284504, &(0x7f0000000100)={0x1, 0x3, 0x8, 0xfffffff8, "ac1529d600e7e3cdb5e4113ce823fd8c2b021bb26367cd272681e0d124ab6b05"}) fallocate(r0, 0x0, 0x0, 0x1000000) 01:10:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000600000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:34 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3000000, 0x11, r0, 0xaf53e000) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) r2 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x109000, 0x0) close_range(r0, r2, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETSW(r3, 0x5403, &(0x7f00000000c0)={0x9, 0x80000001, 0x8, 0x4, 0xa, "61c723745d61aa675598163eb7ea08b65cd575"}) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000100)={0x2, 0x20, 0x6, 0x6ff4, "d7689eeef7ee4404545a293394afb6bf4178888b711d524457e011606d9f00eb"}) [ 1657.184303][ T1167] loop1: detected capacity change from 0 to 140 [ 1657.211593][ T1167] EXT4-fs (loop1): Invalid log cluster size: 147 [ 1657.257552][ T1167] loop1: detected capacity change from 0 to 140 [ 1657.268093][ T1167] EXT4-fs (loop1): Invalid log cluster size: 147 01:10:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000700000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000fffffdfc5178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b000000050000000100000000ffffff97000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:34 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x42, 0x1, 0x7) 01:10:34 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x80000001, 0x800) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r1, 0x24, 0x0, 0x400001) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) r3 = pidfd_open(0x0, 0x0) r4 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r4, 0xffffffffffffffff, 0x2) fgetxattr(r4, 0x0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f00000000c0)={0x8, 0x6, 0xff94, 0x7, "be5396e3a915edcff3fc65b5ecf848ee8ae2ac73b9bcacc6d78fc28c00370618"}) sendfile(r3, r4, 0x0, 0x8) fgetxattr(r2, 0x0, 0x0, 0x0) r5 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r5, 0xffffffffffffffff, 0x2) fgetxattr(r5, 0x0, 0x0, 0x0) sendfile(r5, r0, &(0x7f0000000040)=0x81, 0x0) fallocate(r2, 0x0, 0x0, 0x1000000) 01:10:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000fffffdfd5178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000800000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:34 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x19, 0x4) r1 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r2 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) poll(&(0x7f0000000040)=[{r2, 0x220}], 0x1, 0x850) fallocate(r1, 0x0, 0x0, 0x400001) [ 1657.367140][ T1203] loop1: detected capacity change from 0 to 140 [ 1657.400196][ T1203] EXT4-fs (loop1): Invalid log block size: 4294967040 01:10:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000a00000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000fffffffe5178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1657.446228][ T1203] loop1: detected capacity change from 0 to 140 [ 1657.459949][ T1203] EXT4-fs (loop1): Invalid log block size: 4294967040 01:10:34 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r1, 0xffffffffffffffff, 0x2) fgetxattr(r1, 0x0, 0x0, 0x0) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000000)={0x1, 0xff, 0x0, 0x24, "ed005400000000003ec13e200005532ff6df0000000000001f00"}) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r3, 0xffffffffffffffff, 0x2) fgetxattr(r3, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf, 0x4010, r1, 0x10000000) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_setup(0x5786, &(0x7f0000000340)={0x0, 0x1786, 0x8, 0x1}, &(0x7f0000fcf000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r6 = socket(0x2, 0xa, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000200)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r6, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, r5, &(0x7f0000000100)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000240)={0x0, 0x989680}, 0x1, 0x0, 0x1}, 0x7) signalfd4(r3, &(0x7f0000000040)={[0x5]}, 0x8, 0x0) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1000000) 01:10:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000fcfdffff5178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000b00000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b000000050000000100000000000000ac000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:34 executing program 4: r0 = syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), 0xffffffffffffffff) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000100)=@req={0x28, &(0x7f00000000c0)={'veth0\x00', @ifru_addrs=@xdp={0x2c, 0x0, 0x0}}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000004c0)={'sit0\x00', &(0x7f0000000440)={'syztnl2\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @loopback}}) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f0000000340)={0x68, r0, 0x800, 0x70bd27, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8}]}, @MPTCP_PM_ATTR_ADDR={0x48, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r3}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x400c880) r4 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r5 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r5, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) write$binfmt_script(r5, &(0x7f0000000240)={'#! ', './file0', [{}, {0x20, '#,{:{:4\x80-\'&&['}, {0x20, '{&]\\}]//}(,$--}\'\xd5:'}], 0xa, "9727c12d4bd2cdcdf20a57cbea75b3a75a31c5836cd988ad24f046045773dfcd2a62038982a073031e453908b947e696ef3fcc559e9154522aa63261496649984f7a79bcdd31cbcf8e8f4730c9daeca2e8c41c680081e8ab829c2d695c5966e0668e6cd53abea095640e7472febcf808d2210e48b89e9feaa0fe9976b855c4b953eae193b7a90cce3ac2e1f55ed78f35e4dc04b26faf635d002e6d207363a53a25dde3930347e511"}, 0xd5) fallocate(r4, 0x0, 0x0, 0x400001) fallocate(r4, 0x0, 0x0, 0x1000000) 01:10:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000fdfdffff5178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000001800000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000001c00000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1657.579168][ T1246] loop1: detected capacity change from 0 to 140 [ 1657.612650][ T1246] EXT4-fs (loop1): Invalid log cluster size: 172 01:10:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b000000050000000100000000000000ad000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) [ 1657.697189][ T1268] loop1: detected capacity change from 0 to 140 [ 1657.717406][ T1268] EXT4-fs (loop1): Invalid log cluster size: 173 [ 1657.783152][ T1268] loop1: detected capacity change from 0 to 140 [ 1657.789816][ T1268] EXT4-fs (loop1): Invalid log cluster size: 173 01:10:35 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f00000000c0)=""/75) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000240)={0x8, 0x2, 0x4f, 0x20, 0x8, 0x401}) fallocate(r0, 0x60, 0x0, 0x3ffffd) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x149000) fcntl$setlease(r2, 0x400, 0x2) fallocate(r0, 0x0, 0x0, 0x1000000) 01:10:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000085ffffff5178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000002600000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:35 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x2000000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r4}, {0x0, r4}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {0x0, r4}, {}, {r3, r4}, {0x0, r4}, {}, {}, {}, {0x0, r4}, {r2}, {0x0, r4}, {0x0, r4}, {r3}, {}, {r2}, {}, {r2}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {r3}, {}, {0x0, r4}, {r3}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3, r4}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {0x0, r4}, {}, {r2}, {}, {}, {0x0, r4}, {}, {r3}, {r2}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {0x0, r4}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {r3}, {r2, r4}, {0x0, r4}, {r2}, {r3, r4}, {0x0, r4}, {0x0, r4}, {}, {}, {0x0, r4}, {r2}, {0x0, r4}, {}, {}, {}, {}, {r3, r4}, {r2, r4}, {r3}, {}, {r2, r4}, {r2}, {r3, r4}, {}, {r2}, {r2, r4}, {}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {r3}, {}, {}, {0x0, r4}, {0x0, r4}, {r3, r4}, {r2, r4}, {r3, r4}, {0x0, r4}, {}, {r3, r4}, {r3}, {}, {0x0, r4}, {r2}, {0x0, r4}, {r3, r4}, {r2}, {0x0, r4}, {r3, r4}, {}, {0x0, r4}, {}, {0x0, r4}, {r3}, {0x0, r4}, {r3}, {}, {}, {}, {}, {0x0, r4}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {0x0, r4}, {r2}, {}, {r2}, {0x0, r4}, {r3}, {r2, r4}, {r2, r4}, {0x0, r4}, {0x0, r4}, {}, {}, {0x0, r4}, {r3}, {r2}, {}, {r2}, {}, {0x0, r4}, {r3, r4}, {0x0, r4}, {r3, r4}, {0x0, r4}, {}, {r3, r4}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {r3}, {r3}, {}, {}, {r3}, {0x0, r4}, {}, {r2, r4}, {r2}, {}, {}, {}, {}, {r3, r4}, {r2}, {0x0, r4}, {r2}, {r3, r4}, {r2, r4}, {r3}, {}, {}, {}, {}, {}, {r2}, {0x0, r4}, {r2, r4}, {0x0, r4}, {r3}, {r3}, {r2}, {0x0, r4}, {r3, r4}, {r3}, {0x0, r4}, {}, {}, {}, {0x0, r4}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000054680)={0x0, 0x0, "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", "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"}) r6 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) pidfd_getfd(0xffffffffffffffff, r6, 0x0) ioctl$SG_IO(r6, 0x2285, &(0x7f0000001640)={0x53, 0x0, 0x4d, 0x0, @scatter={0x5, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000140)=""/218, 0xda}, {&(0x7f00000013c0)=""/57, 0x39}, {&(0x7f0000000240)=""/22, 0x16}, {&(0x7f0000000300)=""/186, 0xba}, {&(0x7f0000001580)=""/191, 0xbf}]}, &(0x7f00000000c0)="75689d2db59d502e99c5d5c3caa87e479e83968fd1eefb4ba6d941a22fb928f2f16a60e192ae2cb7afbf6e22e9fd0fe9f3f6c490df0b642685262142cd523b15e8a63a0243602599d5edb2df3f", 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r10, &(0x7f0000000240)={&(0x7f0000000fc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001740)=ANY=[@ANYBLOB="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", @ANYRES64=r9, @ANYRESHEX, @ANYRES32=r8, @ANYRESOCT, @ANYRES64, @ANYRESHEX=r7], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000055680)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2, r5}, {0x0, r8}], 0x0, "878c96505864ce"}) memfd_create(&(0x7f0000000080)='\x00', 0x2) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x3, 0x0, 0x1000000) 01:10:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b000000050000000100000000ffffffda000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:35 executing program 3: memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x40, 0x101002) r1 = perf_event_open$cgroup(&(0x7f00000000c0)={0x5, 0x80, 0x4, 0x3f, 0x2, 0x3b, 0x0, 0x3ff, 0x20200, 0x7, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_config_ext={0x100000001}, 0x4000, 0x200000000, 0x1, 0x4, 0x8, 0x7fff, 0xffff, 0x0, 0x80000001}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb8, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001640)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000000400)={{}, r5, 0x6, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16=r6]}, @subvolid=0xffffffff}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002040)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r8, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r7, @ANYRES32=r6, @ANYRESOCT, @ANYRES32=r4, @ANYRES32, @ANYRES64, @ANYRESHEX=r2], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, &(0x7f00000002c0)={{r1}, 0x0, 0x0, @inherit={0x50, &(0x7f0000000240)={0x1, 0x1, 0x1, 0x5, {0xc, 0x5, 0x3, 0x4, 0x3f}, [0xa2e5]}}, @devid=r7}) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x204380, 0x0) copy_file_range(r9, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(r0, 0x4, 0x0, 0x400001) 01:10:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000f6ffffff5178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1658.363444][ T1295] loop1: detected capacity change from 0 to 140 [ 1658.370903][ C0] sd 0:0:1:0: tag#1328 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1658.380771][ C0] sd 0:0:1:0: tag#1328 CDB: opcode=0x75 (reserved) [ 1658.387324][ C0] sd 0:0:1:0: tag#1328 CDB[00]: 75 68 9d 2d b5 9d 50 2e 99 c5 d5 c3 ca a8 7e 47 [ 1658.396377][ C0] sd 0:0:1:0: tag#1328 CDB[10]: 9e 83 96 8f d1 ee fb 4b a6 d9 41 a2 2f b9 28 f2 01:10:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000feffffff5178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000fe00000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1658.405411][ C0] sd 0:0:1:0: tag#1328 CDB[20]: f1 6a 60 e1 92 ae 2c b7 af bf 6e 22 e9 fd 0f e9 [ 1658.414461][ C0] sd 0:0:1:0: tag#1328 CDB[30]: f3 f6 c4 90 df 0b 64 26 85 26 21 42 cd 52 3b 15 [ 1658.423496][ C0] sd 0:0:1:0: tag#1328 CDB[40]: e8 a6 3a 02 43 60 25 99 d5 ed b2 df 3f [ 1658.446207][ T1295] EXT4-fs (loop1): Invalid log block size: 4294967040 01:10:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b000000050000000100000000000000e4000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000200005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000402000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000300005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:35 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) r2 = dup3(r1, r0, 0x0) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r3, 0xffffffffffffffff, 0x2) fgetxattr(r3, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0x0, r3, 0x3, 0x7fff, 0x80, 0x7f}) fallocate(r0, 0x3, 0x0, 0x1000000) [ 1658.552061][ T1331] loop1: detected capacity change from 0 to 140 [ 1658.580340][ T1331] EXT4-fs (loop1): Invalid log cluster size: 228 01:10:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000003000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000400005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:35 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f0000000040)={0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x400001) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f00000000c0)=""/99) ioctl$BTRFS_IOC_SEND(r0, 0x40489426, &(0x7f0000000280)={{r2}, 0x1, &(0x7f0000000240)=[0x2], 0x80, 0x2, [0x2, 0xfaad, 0x100, 0xfffffffffffffe00]}) 01:10:35 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f0833e93a00"}) fallocate(r0, 0x0, 0x0, 0x400001) [ 1658.644449][ T1331] loop1: detected capacity change from 0 to 140 [ 1658.655249][ T1331] EXT4-fs (loop1): Invalid log cluster size: 228 01:10:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000204000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b000000050000000100000000fffffff4000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:35 executing program 2: memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x313000, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) write$evdev(r0, &(0x7f0000000240)=[{{r2, r3/1000+60000}, 0x0, 0x3ff, 0xfffffffc}, {{0x77359400}, 0x14, 0x1f, 0x831d}], 0x30) close_range(r1, 0xffffffffffffffff, 0x2) r4 = socket(0x22, 0x800000003, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000400)={r6, 0x3, 0x6}, 0x10) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f00000001c0)={r6, 0x3, 0x6, @random="2ce5550bbffa"}, 0x10) r7 = socket(0x11, 0x800000003, 0x0) r8 = socket(0x11, 0x800000003, 0x0) bind(r8, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) setsockopt$packet_add_memb(r7, 0x107, 0x1, &(0x7f0000000140)={r9, 0x3, 0x6, @dev}, 0x10) close(r7) 01:10:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000500005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000604000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:35 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x2) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x37166b242bae1787) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000080)={0x1f, 0x3, 0x0, 0x0, "e23e90867f9a38afad7eab14b671d0f0064c58866dce36ca5e52c04d08fe79a4"}) 01:10:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000600005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1658.766881][ T1378] loop1: detected capacity change from 0 to 140 [ 1658.802006][ T1378] EXT4-fs (loop1): Invalid log block size: 4294967040 01:10:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b000000050000000100000000fffffff6000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:35 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) memfd_create(&(0x7f0000000040)='/(*@}/%,}\'M%\x00', 0x0) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) fallocate(r2, 0x3, 0x0, 0x1000000) r3 = openat$cgroup_ro(r2, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000100)={0x50d0, 0x8, 0x1, 0x81, 0x6, 0xfffffff7}) 01:10:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000008004000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000700005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:35 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x20280, 0x0) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000240)={0x0, 0x9, 0x7, 0x10001, 0x10000, 0x6}) r1 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r2 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r1, 0x0, 0x0, 0x400001) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x200500, 0x0) sendfile(r3, r2, &(0x7f00000000c0)=0x6, 0x5) fallocate(r1, 0x3, 0x0, 0x1000000) [ 1658.901973][ T1403] loop1: detected capacity change from 0 to 140 [ 1658.934435][ T1403] EXT4-fs (loop1): Invalid log block size: 4294967040 01:10:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000800005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000005000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:35 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2000000, 0x30, r0, 0x4b67e000) r2 = accept$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @multicast2}, &(0x7f00000005c0)=0x10) statx(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x800, 0x881, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r5) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r7) fsetxattr$system_posix_acl(r2, &(0x7f0000000600)='system.posix_acl_default\x00', &(0x7f0000000780)={{}, {0x1, 0x5}, [{0x2, 0x4, 0xffffffffffffffff}, {0x2, 0x3}, {0x2, 0x4, r3}, {0x2, 0x1}, {0x2, 0x0, r5}], {0x4, 0x7}, [{0x8, 0x0, r7}], {0x10, 0x1}}, 0x54, 0x1) fallocate(r0, 0x0, 0x0, 0x400001) r8 = syz_open_dev$vcsa(&(0x7f0000000040), 0x4ae, 0x1003) writev(r8, &(0x7f00000000c0)=[{&(0x7f0000000240)="5388db72915091582879d7ded39444b32631b4ce32bc0e478ec6336850e7f9445776f8904424f2328b1cae834e5a1be582731a62a0a3cdd304e1dc8b14ec1baab919d623556a2b157b973cc197acec2694498a359033d6cb10d5e78e9afa1d8f58b58f45385fafdefce98c70d5ba4ce1ac68525506ee2f93df501d7850cf7eaa93f8e783bf333844e16f19", 0x8b}, {&(0x7f0000000300)="d1a9a810613bdbe491db29ee71b387e7516077ac88e4af4410a9c22dd17b7d58f2d4f9eb7520c71b94bb578918d3121ed08ef9afb9770f8121e910c4fc6d8e025d40bd8915c92d4fae0f94d009e09cfc759d607f452ee97e7cf1b5d006de2a7ddd2ca8007dd93b852317bdbc01cbcc1248b6f7539ec1bda10cfd1a4124a0890cba341ee7064355304545c853f2a2dfb002f7727e3611e660cad8b51d94a8baa70a2b68a7166dd19d0c327a450d9b65f022ad253e91465820933d1add4743b1200c0db6f87cb5a628908b6f2b31a26ab5a7913c824297a64c52d47581d151057d9384", 0xe2}, {&(0x7f0000000400)="fbeaa9320e49d5205f6cf89ea643c3f15193d953e2ad27df079c03176f889b273958873de068ea54dd25f377567216dd825521257c75a9d3b00e32cdf963ff49f0734a7a8f5926c63f4597930decfecdb4b14d9a2ff40737977f26d4415fe9b506d096eff01fdb234e2ddc0b5bb962b76dc8fc64f3416e0025654fb73c9de896f0bf68554b469800bf6bec5f94bc7282dc9b6576cf16f7413b14914dc2f11141b7b30d40993f4053f80f20db7c2678a232d81bc6d120cf19bdb4c3ba80ca2f5fd68a2194ad2d0e9c3aa7d88a1ca0d221", 0xd0}, {&(0x7f0000000500)="0aacdd937e15756b2b496d7a356a6cb71eb9f591c2aa3e73ab6096916a0e053881b905460a0437af68cdc3f1517453b493e09aa8e92239fec2ebfa6f591420dcdbbd2af8596fb987dd21195e2591f460ad57c38ab3f3f4b7aed0885ebf7da3839db878a4abeb8912190b9ffd4b6db62cec36515c386eaa2cc226aef245814f23287779e5969bf9927840753e53d4a2e1e07a7f117f8767fdd16839466d753908dad15f39865b31fe85b36c1b9d925159d88de1b321880db6af", 0xb9}], 0x4) 01:10:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000007705000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000a00005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:35 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x9, 0x13, r0, 0x3409c000) fallocate(r0, 0x0, 0x0, 0x400001) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r1, 0x50009418, &(0x7f0000000240)={{r2}, 0x0, 0x8, @unused=[0x7d5, 0x7, 0xffffffffffffff7f, 0x5], @subvolid=0x8}) fallocate(r1, 0x1b, 0x0, 0x1000000) [ 1659.018014][ T1403] loop1: detected capacity change from 0 to 140 [ 1659.030193][ T1403] EXT4-fs (loop1): Invalid log block size: 4294967040 01:10:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b000000050000000100000000fffffdf9000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000006000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:35 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x8000008001, 0x430500) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:36 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/49, 0x31}], 0x1, 0x101, 0x5) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x3, 0x0, 0x1000000) 01:10:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000b00005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000406000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:36 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000240)=""/251) [ 1659.133046][ T1451] loop1: detected capacity change from 0 to 140 [ 1659.167632][ T1451] EXT4-fs (loop1): Invalid log block size: 4261412608 01:10:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000001800005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000007000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:36 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x18, 0x0, 0x22, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x3, 0x0, 0x1000000) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000040)=0xe7) [ 1659.224472][ T1451] loop1: detected capacity change from 0 to 140 [ 1659.234838][ T1451] EXT4-fs (loop1): Invalid log block size: 4261412608 01:10:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000001c00005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000000a000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b000000050000000100000000fffffffb000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:36 executing program 2: semop(0x0, &(0x7f0000000040)=[{0x4, 0x1ff, 0x1800}, {0x0, 0x80, 0x1400}, {0x4, 0x9, 0x800}, {0x1, 0x83, 0x800}], 0x4) r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x3, 0x0, 0x1000000) 01:10:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000002600005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000000b000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000fe00005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000018000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1659.413512][ T1502] loop1: detected capacity change from 0 to 140 [ 1659.445226][ T1502] EXT4-fs (loop1): Invalid log block size: 4294967040 01:10:36 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r2 = open(&(0x7f0000000040)='./file0\x00', 0x240000, 0x43) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x7, 0x800, 0xfffffffa}, {{r3, r4/1000+10000}, 0x4, 0x80, 0x8}, {{0x77359400}, 0x0, 0x400, 0x8}, {{0x77359400}, 0x17, 0x1, 0x4d}, {{0x77359400}, 0x5, 0xff, 0x9}, {{}, 0x1f, 0xd35, 0x490e}, {{r5, r6/1000+60000}, 0x2, 0xffff, 0x4}], 0xa8) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x3, 0x0, 0x1000000) 01:10:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000001c000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000402005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1659.524241][ T1502] loop1: detected capacity change from 0 to 140 [ 1659.531782][ T1502] EXT4-fs (loop1): Invalid log block size: 4294967040 01:10:36 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000040)=0x6) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x3, 0x0, 0x1000000) 01:10:36 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) sendfile(r2, r0, &(0x7f00000000c0)=0x3, 0x7fff) setuid(0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r4) lstat(&(0x7f00000022c0)='./file0/file0\x00', &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r7) sendmsg$unix(0xffffffffffffffff, &(0x7f0000002480)={&(0x7f0000000a40)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000dc0)=[{&(0x7f0000000ac0)="c848e6fbfa3b80ff31523b583152066c1879a91a3c1a28ad19926c5d27170f5033b845c4d6f3af2a", 0x28}, {&(0x7f0000000b00)="f0584dcd3b47534f72ba62c8d2ff4ee3d19273801bc12973bb6ae6e047946d35575c21216ca8bac1a6a6c989465678a66ae59269d03968e2d8f72908190c4c12a596f87ac85554131f0f7dc53452a1025791134ccdead2fc8b93d12b6fe68485ee264c461599fe1617d55c205573bfd0df152f62c14f28fa35298cdccceef563eb0704be561446eb", 0x88}, {&(0x7f0000000bc0)="d04165d5235eecb32d7201cfd878e233bd5f2b27ded183ff23648363e632458a8dd5297d6921f2714e2344c58dbc78495c891a4c596dac3f78e0d0da1cd7e32b47ad751f7d4dfd55bad6ade6370516e51b667e1bbf243d09ec91662d1fee11bf87225977143c40d28781bc482796078ba03385dde09fee611478a5", 0x7b}, {&(0x7f0000000c40)="a3f1c4f147dc795b9be28d9692e06e4054c968daf81527501eddc5d072536cfc45c4caf75e68cd2d8c6a316b95ae6acd7951b319fb6b602efb296a779433cbfef54e4173a2599f7f77ff6d54029a7d2accb9d4ce964581bb530eebcc2cabbc89aa8b870da3a8feb3a754d71773eb2a779b7fb6ca2442db78c15532faa8c4ab17d5aa952b90c05c3d5dd4e01c1be5b503870e4cf1327861ed8ca49f61fb30fe0144122c38c1659a980e4d3117654e708fee17acc0efea00de74535d51867f5c999b5a9f3f1e7bd155339a41e46073437f98", 0xd1}, {&(0x7f0000000d40)="604fccceeec322a59a85a173f65fe5919ad899a87404343b84d861efd33bab68a42411290b3c109f8458bd9cd48eadd484806c67638da6", 0x37}, {&(0x7f0000000d80)="219804b11793a49d31d24946c7ed4d0e07432704514b697f579986c6068d18594e6738c5c3fb499ac1fe8093d64ae43ec8a7", 0x32}], 0x6, &(0x7f0000002380)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r4}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r5}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r7, 0xee00}}}], 0xd8, 0x20040094}, 0x48801) open(&(0x7f0000000100)='./file0\x00', 0x240040, 0x18) write$binfmt_elf32(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c463f000504050000000000000002003e00040000006f010000380000002603000003000000f5ff2000020003002000c7090000000005000000970700000400000001000000080000000900000000000080080000000600000006000000ff0001000000090000000500000008000000d73d7a8df21d0ca8b2e02d202b821686149c453cb4d64e0bc60fbc8affad6fc36762eeaa5ebda46f6a3ce8d2613876e1c7486a8ce940cc4ee2df5d17ba8a8f158683afa6b7b038bc4468cf8b7b93261205702cdf9b050cd8d2a629bd00"/2004], 0x7d4) r8 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r8, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b000000050000000100000000fffffdfd000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000020000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000003005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1659.675371][ T1551] loop1: detected capacity change from 0 to 140 01:10:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000204005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:36 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x80000) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(r2, 0x40044581, &(0x7f0000000040)=0x7) 01:10:36 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\x06\x00\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0\xf2\xbf\xf5\xedTS\x1c\xd0\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\xf1\x98|D\xe1\x90>\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0\x00\x00\x00\x00\x00\x00\x00', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) preadv(r2, &(0x7f0000001440), 0x0, 0x8, 0x1ff) fallocate(r0, 0x2a, 0x0, 0x400001) fallocate(r0, 0x3, 0x0, 0x1000000) 01:10:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000026000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1659.718027][ T1551] EXT4-fs (loop1): Invalid log block size: 4261412608 01:10:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000604005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:36 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) r2 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0xad, 0x2, 0x7, 0x401}) [ 1659.793586][ T1551] loop1: detected capacity change from 0 to 140 [ 1659.800263][ T1551] EXT4-fs (loop1): Invalid log block size: 4261412608 01:10:36 executing program 2: socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r2, 0x0) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r3, 0xffffffffffffffff, 0x2) fgetxattr(r3, 0x0, 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x0, 0x40, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06006000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000100)=""/11, &(0x7f00000001c0)=0xb) r4 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r5 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r5, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r4, 0x0, 0x0, 0x400001) fallocate(r4, 0x3, 0x0, 0x1000000) 01:10:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000003f000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b000000050000000100000000fffffffd000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000040000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000008004005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:36 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x1) [ 1659.913564][ T1597] loop1: detected capacity change from 0 to 140 [ 1659.919167][ T1596] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 1659.941252][ T1597] EXT4-fs (loop1): Invalid log block size: 4294967040 01:10:36 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x6, 0xff, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x12, 0x1f, 0x400002) fallocate(r0, 0x3, 0x0, 0x1000000) 01:10:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000577000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000005005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1659.993759][ T1597] loop1: detected capacity change from 0 to 140 [ 1660.002898][ T1597] EXT4-fs (loop1): Invalid log block size: 4294967040 01:10:36 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = memfd_create(&(0x7f00000008c0)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) sendfile(r1, r0, 0x0, 0x2) write$evdev(r2, &(0x7f00000000c0)=[{{r3, r4/1000+10000}, 0x17, 0x400, 0x9}, {{0x77359400}, 0x0, 0xb59c, 0x6}, {{0x0, 0x2710}, 0x12, 0x1, 0x9}, {{0x77359400}, 0x12, 0x3638, 0x1}], 0x60) syz_io_uring_setup(0x335, &(0x7f0000000280)={0x0, 0x6e55, 0x10, 0x1, 0xf3}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000300)) syz_io_uring_setup(0x9c0, &(0x7f0000000080), &(0x7f0000bfd000/0x400000)=nil, &(0x7f0000da4000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f00000003c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r8 = socket(0x2, 0xa, 0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000200)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r8, 0x0, 0x0}, 0x0) r9 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r9, 0xffffffffffffffff, 0x2) fgetxattr(r9, 0x0, 0x0, 0x0) syz_io_uring_submit(r5, r7, &(0x7f0000000780)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, r9, 0x0, &(0x7f0000000740)={&(0x7f0000000340)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000000680)=[{&(0x7f00000003c0)=""/146, 0x92}, {&(0x7f0000000480)=""/179, 0xb3}, {&(0x7f0000000540)=""/4, 0x4}, {&(0x7f0000000580)=""/235, 0xeb}], 0x4, &(0x7f00000006c0)=""/113, 0x71}, 0x0, 0x40000001, 0x1}, 0x1ed) fallocate(r0, 0x0, 0x0, 0x400001) mq_timedreceive(r9, &(0x7f00000007c0)=""/228, 0xe4, 0x0, 0x0) 01:10:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b000000050000000100000000fffffffe000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000480000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000a505005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:37 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) memfd_create(&(0x7f0000000040)='\x00', 0x3) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) syz_io_uring_setup(0x9c0, &(0x7f0000000080), &(0x7f0000bfd000/0x400000)=nil, &(0x7f0000da4000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f00000003c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r4 = socket(0x2, 0xa, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0}, 0x0) r5 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) fgetxattr(r5, 0x0, 0x0, 0x0) r6 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r6, 0xffffffffffffffff, 0x2) fgetxattr(r6, 0x0, 0x0, 0x0) r7 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r7, 0xffffffffffffffff, 0x2) fgetxattr(r7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f0000000100)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0x10000, &(0x7f00000000c0)=[0xffffffffffffffff, 0xffffffffffffffff, r5, r6, r7, r0, r1], 0x7}, 0x2) fallocate(r0, 0x3, 0x0, 0x1000000) 01:10:37 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000fdef000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1660.130832][ T1634] loop1: detected capacity change from 0 to 140 [ 1660.150194][ T1634] EXT4-fs (loop1): Invalid log block size: 4294967040 01:10:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000006005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:37 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) [ 1660.213797][ T1634] loop1: detected capacity change from 0 to 140 [ 1660.223225][ T1634] EXT4-fs (loop1): Invalid log block size: 4294967040 01:10:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b0000000500000001fffffffffffffffe000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000effd000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000406005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:37 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) fsetxattr$security_capability(r2, &(0x7f0000000040), &(0x7f00000000c0)=@v1={0x1000000, [{0x1000, 0x8001}]}, 0xc, 0x2) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x3, 0x0, 0x1000000) 01:10:37 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) [ 1660.341320][ T1675] loop1: detected capacity change from 0 to 140 01:10:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000fffe000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000007005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1660.382928][ T1675] EXT4-fs (loop1): Invalid log block size: 4294967295 01:10:37 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) writev(r1, &(0x7f0000000040), 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x3, 0x0, 0x1000000) 01:10:37 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000feff000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000a005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1660.464365][ T1675] loop1: detected capacity change from 0 to 140 [ 1660.490456][ T1675] EXT4-fs (loop1): Invalid log block size: 4294967295 01:10:37 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000fff000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:37 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) preadv(r2, &(0x7f0000000040)=[{&(0x7f0000000240)=""/184, 0xb8}], 0x1, 0x0, 0x401) fallocate(r0, 0x3, 0x0, 0x1000000) 01:10:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000c018010000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000b005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:37 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000080000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1660.645983][ T1734] loop1: detected capacity change from 0 to 140 [ 1660.673268][ T1734] EXT4-fs (loop1): Invalid log block size: 251658240 01:10:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000018005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:37 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x4, 0x1d, 0xffff, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) fallocate(r2, 0x0, 0x4, 0x400001) fallocate(r0, 0x3, 0x0, 0x1000000) 01:10:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000004000080000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:37 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000240)) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x3, 0x0, 0x1000000) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000040)={0x8, 'ip6tnl0\x00', {'vcan0\x00'}, 0x3}) 01:10:37 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) [ 1660.757438][ T1734] loop1: detected capacity change from 0 to 140 [ 1660.775260][ T1734] EXT4-fs (loop1): Invalid log block size: 251658240 01:10:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000001c005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b000000050000000100000000fffffbff000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000200000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:37 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:37 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f00000000c0)={r1, 0x7f, 0x101, 0x4}) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r3, 0xffffffffffffffff, 0x2) fgetxattr(r3, 0x0, 0x0, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000340)=0x7) r4 = accept$packet(r2, 0x0, &(0x7f0000000300)) write$binfmt_aout(r4, &(0x7f0000000540)={{0x0, 0x5, 0xff, 0x183, 0x1d3, 0x79, 0x322, 0xfffffffe}, "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"}, 0x276) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f0000000040)) fallocate(r0, 0x3, 0x0, 0x1000000) r5 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r5, 0xffffffffffffffff, 0x2) fgetxattr(r5, 0x0, 0x0, 0x0) readv(r5, &(0x7f00000002c0)=[{&(0x7f0000000100)=""/20, 0x14}, {&(0x7f0000000240)=""/35, 0x23}, {&(0x7f0000000280)=""/14, 0xe}], 0x3) 01:10:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000020005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000400000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:37 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000026005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1660.915757][ T1795] loop1: detected capacity change from 0 to 140 [ 1660.948447][ T1795] EXT4-fs (loop1): Invalid log block size: 4227858176 01:10:37 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@ipv4={""/10, ""/2, @broadcast}, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) fchown(r2, r3, 0x0) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x3, 0x0, 0x1000000) 01:10:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000007ffff00000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000003f005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1661.017053][ T1795] loop1: detected capacity change from 0 to 140 [ 1661.027497][ T1795] EXT4-fs (loop1): Invalid log block size: 4227858176 01:10:37 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b0000000500000001000000007fffffff000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000100000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000040005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:38 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000480005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000200000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:38 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) [ 1661.189575][ T1848] loop1: detected capacity change from 0 to 140 [ 1661.218097][ T1848] EXT4-fs (loop1): Invalid log block size: 4294934272 01:10:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="0000000000000000000000000000000000000000000000000005a5005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000040200000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1661.283663][ T1848] loop1: detected capacity change from 0 to 140 [ 1661.299683][ T1848] EXT4-fs (loop1): Invalid log block size: 4294934272 01:10:38 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400001) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400001) 01:10:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000fffe005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000300000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b000000050000000100000000ffffffff000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000400000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:38 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400001) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400001) 01:10:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000feff005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1661.479952][ T1893] loop1: detected capacity change from 0 to 140 01:10:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000002005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000500000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:38 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400001) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400001) [ 1661.521186][ T1893] EXT4-fs (loop1): Invalid log block size: 4294967040 01:10:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000003005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:38 executing program 3: r0 = memfd_create(0x0, 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) [ 1661.594165][ T1893] loop1: detected capacity change from 0 to 140 [ 1661.607318][ T1893] EXT4-fs (loop1): Invalid log block size: 4294967040 01:10:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010007ffffffffffff000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000600000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:38 executing program 3: r0 = memfd_create(0x0, 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000004005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000040600000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1661.716219][ T1927] loop1: detected capacity change from 0 to 140 [ 1661.744397][ T1927] EXT4-fs (loop1): Invalid log block size: 4294967295 01:10:38 executing program 3: r0 = memfd_create(0x0, 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000005005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1661.794785][ T1927] loop1: detected capacity change from 0 to 140 [ 1661.812039][ T1927] EXT4-fs (loop1): Invalid log block size: 4294967295 01:10:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000700000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000017fffffffffffffff000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:38 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000006005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000800000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000007005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1661.932147][ T1965] loop1: detected capacity change from 0 to 140 [ 1661.963603][ T1965] EXT4-fs (loop1): Invalid log block size: 4294967295 01:10:38 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000a00000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1662.043480][ T1965] loop1: detected capacity change from 0 to 140 [ 1662.052774][ T1965] EXT4-fs (loop1): Invalid log block size: 4294967295 01:10:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000008005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b0000000500000001feffffffffffffff000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000b00000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:39 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000a005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000001800000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1662.206908][ T2006] loop1: detected capacity change from 0 to 140 [ 1662.249167][ T2006] EXT4-fs (loop1): Invalid log block size: 4294967295 01:10:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000b005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:39 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000001c00000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1662.303958][ T2006] loop1: detected capacity change from 0 to 140 [ 1662.322275][ T2006] EXT4-fs (loop1): Invalid log block size: 4294967295 01:10:39 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b0000000500000001ffffffffffffffff000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000002600000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000018005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:39 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000001c005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000003f00000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1662.417713][ T2039] loop1: detected capacity change from 0 to 140 [ 1662.450533][ T2039] EXT4-fs (loop1): Invalid log block size: 4294967295 01:10:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000004000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000026005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:39 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) [ 1662.526859][ T2039] loop1: detected capacity change from 0 to 140 [ 1662.553131][ T2039] EXT4-fs (loop1): Invalid log block size: 4294967295 01:10:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000008004000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="0000000000000000000000000000000000000000000000000000fe005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010002000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:39 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000057700000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000004025178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1662.682924][ T2077] loop1: detected capacity change from 0 to 140 [ 1662.706149][ T2077] EXT4-fs (loop1): bad geometry: first data block 131073 is beyond end of filesystem (64) 01:10:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000f0ff7f00000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:39 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) [ 1662.771767][ T2077] loop1: detected capacity change from 0 to 140 [ 1662.785855][ T2077] EXT4-fs (loop1): bad geometry: first data block 131073 is beyond end of filesystem (64) 01:10:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000035178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000048000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010003000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:39 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, 0x0) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000002045178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000ffffff8500000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:39 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, 0x0) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) [ 1662.910781][ T2113] loop1: detected capacity change from 0 to 140 [ 1662.928013][ T2113] EXT4-fs (loop1): bad geometry: first data block 196609 is beyond end of filesystem (64) [ 1662.987563][ T2113] loop1: detected capacity change from 0 to 140 [ 1662.998065][ T2113] EXT4-fs (loop1): bad geometry: first data block 196609 is beyond end of filesystem (64) 01:10:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000006045178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000000118c000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:39 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, 0x0) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010004000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000fffffdef00000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000080045178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:40 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000fffffff600000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000055178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1663.144610][ T2151] loop1: detected capacity change from 0 to 140 [ 1663.172903][ T2151] EXT4-fs (loop1): bad geometry: first data block 262145 is beyond end of filesystem (64) 01:10:40 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000fffffdfc00000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="0000000000000000000000000000000000000000000000000000a5055178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1663.245525][ T2151] loop1: detected capacity change from 0 to 140 [ 1663.257174][ T2151] EXT4-fs (loop1): bad geometry: first data block 262145 is beyond end of filesystem (64) 01:10:40 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000065178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010005000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000fffffdfd00000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000004065178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:40 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000fffffffe00000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1663.389249][ T2191] loop1: detected capacity change from 0 to 140 [ 1663.428386][ T2191] EXT4-fs (loop1): bad geometry: first data block 327681 is beyond end of filesystem (64) 01:10:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000075178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:40 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="0000000000000000000000000000000000000000000000000000000a5178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000effdffff00000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1663.506366][ T2191] loop1: detected capacity change from 0 to 140 [ 1663.525011][ T2191] EXT4-fs (loop1): bad geometry: first data block 327681 is beyond end of filesystem (64) 01:10:40 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010006000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="0000000000000000000000000000000000000000000000000000000b5178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000fcfdffff00000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000fdfdffff00000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:40 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x400001) [ 1663.649813][ T2229] loop1: detected capacity change from 0 to 140 [ 1663.671195][ T2229] EXT4-fs (loop1): bad geometry: first data block 393217 is beyond end of filesystem (64) 01:10:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000185178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000085ffffff00000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="0000000000000000000000000000000000000000000000000000001c5178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1663.749237][ T2229] loop1: detected capacity change from 0 to 140 [ 1663.757281][ T2229] EXT4-fs (loop1): bad geometry: first data block 393217 is beyond end of filesystem (64) 01:10:40 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010007000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000f6ffffff00000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000205178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:40 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000feffffff00000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1663.862425][ T2264] loop1: detected capacity change from 0 to 140 [ 1663.895060][ T2264] EXT4-fs (loop1): bad geometry: first data block 458753 is beyond end of filesystem (64) 01:10:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000265178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000037dc12502000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010008000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:40 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400001) 01:10:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="0000000000000000000000000000000000000000000000000000003f5178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000010000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1664.052779][ T2289] loop1: detected capacity change from 0 to 140 [ 1664.085205][ T2289] EXT4-fs (loop1): bad geometry: first data block 524289 is beyond end of filesystem (64) 01:10:41 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400001) 01:10:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000080000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1664.160632][ T2289] loop1: detected capacity change from 0 to 140 [ 1664.174334][ T2289] EXT4-fs (loop1): bad geometry: first data block 524289 is beyond end of filesystem (64) 01:10:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000405178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000f0ffffff7f0000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:41 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400001) 01:10:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010009000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000004805178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:41 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x0) 01:10:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000100000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1664.341824][ T2335] loop1: detected capacity change from 0 to 140 [ 1664.355836][ T2335] EXT4-fs (loop1): bad geometry: first data block 589825 is beyond end of filesystem (64) 01:10:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000005a55178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:41 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x0) 01:10:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b0000000500000001000a000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000ffffffffffff0700000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:41 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x0) 01:10:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="0000000000000000000000000000000000000000000000000000fffe5178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1664.463088][ T2353] loop1: detected capacity change from 0 to 140 [ 1664.476853][ T2353] EXT4-fs (loop1): bad geometry: first data block 655361 is beyond end of filesystem (64) 01:10:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="0000000000000000000000000000000000000000000000000000feff5178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000002000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1664.533346][ T2353] loop1: detected capacity change from 0 to 140 [ 1664.550513][ T2353] EXT4-fs (loop1): bad geometry: first data block 655361 is beyond end of filesystem (64) 01:10:41 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000025178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000004000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b0000000500000001000b000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000000000007ffff000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000035178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:41 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000007ffffffff000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1664.719855][ T2395] loop1: detected capacity change from 0 to 140 [ 1664.758532][ T2395] EXT4-fs (loop1): bad geometry: first data block 720897 is beyond end of filesystem (64) 01:10:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000045178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1664.813929][ T2395] loop1: detected capacity change from 0 to 140 [ 1664.822270][ T2395] EXT4-fs (loop1): bad geometry: first data block 720897 is beyond end of filesystem (64) 01:10:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000055178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:41 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000001000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000065178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b0000000500000001000c000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000002000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000075178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:41 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000402000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1665.055328][ T2438] loop1: detected capacity change from 0 to 140 [ 1665.093763][ T2438] EXT4-fs (loop1): bad geometry: first data block 786433 is beyond end of filesystem (64) 01:10:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000085178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000003000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:42 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="0000000000000000000000000000000000000000000000000000000a5178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1665.177067][ T2438] loop1: detected capacity change from 0 to 140 [ 1665.197212][ T2438] EXT4-fs (loop1): bad geometry: first data block 786433 is beyond end of filesystem (64) 01:10:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000225c17d03000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="0000000000000000000000000000000000000000000000000000000b5178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b0000000500000001000d000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:42 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000004000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000185178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1665.376773][ T2482] loop1: detected capacity change from 0 to 140 [ 1665.404212][ T2482] EXT4-fs (loop1): bad geometry: first data block 851969 is beyond end of filesystem (64) 01:10:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000005000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:42 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1000000) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r2, &(0x7f0000000240)={&(0x7f0000000fc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001740)=ANY=[@ANYBLOB="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", @ANYRES64, @ANYRESHEX, @ANYRES32, @ANYRESOCT, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) pidfd_getfd(0xffffffffffffffff, r3, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000001640)={0x53, 0x0, 0x4d, 0x0, @scatter={0x5, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000140)=""/218, 0xda}, {&(0x7f00000013c0)=""/57, 0x39}, {&(0x7f0000000240)=""/22, 0x16}, {&(0x7f0000000300)=""/186, 0xba}, {&(0x7f0000001580)=""/191, 0xbf}]}, &(0x7f00000000c0)="75689d2db59d502e99c5d5c3caa87e479e83968fd1eefb4ba6d941a22fb928f2f16a60e192ae2cb7afbf6e22e9fd0fe9f3f6c490df0b642685262142cd523b15e8a63a0243602599d5edb2df3f", 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r7, &(0x7f0000000240)={&(0x7f0000000fc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001740)=ANY=[@ANYBLOB="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", @ANYRES64=r6, @ANYRESHEX, @ANYRES32=r5, @ANYRESOCT, @ANYRES64, @ANYRESHEX=r4], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f00000003c0)=ANY=[@ANYRES64=0x0, @ANYBLOB="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"]) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f00000531c0)={0x20000, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {r8}], 0x1f, "6f7bd77250c45e"}) 01:10:42 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) [ 1665.473318][ T2482] loop1: detected capacity change from 0 to 140 [ 1665.487808][ T2482] EXT4-fs (loop1): bad geometry: first data block 851969 is beyond end of filesystem (64) 01:10:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="0000000000000000000000000000000000000000000000000000001c5178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000006000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b0000000500000001000e000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000265178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000406000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000fe5178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:42 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000007000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1665.657713][ T2530] loop1: detected capacity change from 0 to 140 [ 1665.685632][ T2530] EXT4-fs (loop1): bad geometry: first data block 917505 is beyond end of filesystem (64) 01:10:42 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x32783000) fcntl$addseals(r0, 0x409, 0x2) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x8, 0xfffd, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000240)="67ba94afc58c7c305e32694ac4bd486d77b6689bfb4f3dbb7261a7409c105708953489e13d2593c818f2032819e74c390f9e4f40862a3aa1a64a9d3e0d081f1ac8b7007fc04fc3dccf1c630fb050ae16efea6dd38cb85c465d7fc9a7c3ff4a1f79457096c4767e9218efb2a09f8eb656f23246fe3bdd5c55fc52b024582706eaf3e119f4065071a9c61a9c43384346e02bf7413581c6353569ccf76e39874eecdea12344307d78f89c18726dc1e79e198b9ab443ce59c292fac7aeeca3c3be90538cd538ff0866f9338b83cebd67a4eac7f40dccb03a7ff34d4af71e29820bfd", 0xe0}, {&(0x7f0000000040)}, {&(0x7f00000000c0)="e59388752b80ba46a15bae511c41a5f0ab1b763904abe3ce22931ea6165d6e8c4edf2d3f3f4579b11fe5b1a38664128469cf4827a6953091ac5ae23afe23df94446df12673dde14aa0d7c5796b441822ae6bc9eece94", 0x56}], 0x3, 0x0, 0x8) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1000000) 01:10:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005163aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000008000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1665.754025][ T2530] loop1: detected capacity change from 0 to 140 [ 1665.779794][ T2530] EXT4-fs (loop1): bad geometry: first data block 917505 is beyond end of filesystem (64) 01:10:42 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) fallocate(r2, 0x0, 0x20000, 0x400001) r3 = syz_open_dev$vcsu(&(0x7f0000000040), 0x9, 0x201080) dup3(r3, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x1000000) 01:10:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb020000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b0000000500000001000f000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:42 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000000000000000000a000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb040000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:42 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000240)=""/186) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1000000) 01:10:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000000000000000000b000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1665.912985][ T2583] loop1: detected capacity change from 0 to 140 [ 1665.944350][ T2583] EXT4-fs (loop1): bad geometry: first data block 983041 is beyond end of filesystem (64) 01:10:42 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb080000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000018000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:42 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r3, 0xffffffffffffffff, 0x2) fgetxattr(r3, 0x0, 0x0, 0x0) sendfile(r3, r1, &(0x7f0000000040)=0xfffffffffffff800, 0x1f) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) fallocate(r2, 0x0, 0xfffffffffffffffe, 0x6) 01:10:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb0f0000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1666.036195][ T2583] loop1: detected capacity change from 0 to 140 [ 1666.053380][ T2583] EXT4-fs (loop1): bad geometry: first data block 983041 is beyond end of filesystem (64) 01:10:42 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010010000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000000000000000001c000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:43 executing program 4: r0 = memfd_create(&(0x7f0000000240)='\x9d\b\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91qh\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xafc\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\xb0\xd5\x00\x00h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x2) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) dup2(r1, r1) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1000000) 01:10:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedbfe0000001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000026000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedbfeff00001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1666.209156][ T2636] loop1: detected capacity change from 0 to 140 [ 1666.240444][ T2636] EXT4-fs (loop1): bad geometry: first data block 1048577 is beyond end of filesystem (64) 01:10:43 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000000000000000003f000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedbfeffffff1300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1666.324797][ T2636] loop1: detected capacity change from 0 to 140 [ 1666.335541][ T2636] EXT4-fs (loop1): bad geometry: first data block 1048577 is beyond end of filesystem (64) 01:10:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010011000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030200001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000040000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:43 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400001) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400001) 01:10:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000080040000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1666.462647][ T2672] loop1: detected capacity change from 0 to 140 [ 1666.506659][ T2672] EXT4-fs (loop1): bad geometry: first data block 1114113 is beyond end of filesystem (64) 01:10:43 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x6801, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x40284504, &(0x7f00000000c0)={0x6, 0x7, 0x800, 0x7, "5612a9696cb26f7a05372d4923d0a67c7878b140ff37412e4ddf23b304446cbe"}) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) epoll_create(0x7f) r3 = fspick(r2, &(0x7f0000000280)='./file0\x00', 0x1) fsetxattr$security_capability(r3, &(0x7f0000000100), &(0x7f00000002c0)=@v2={0x2000000, [{0x51, 0x9}, {0x9, 0x5}]}, 0x14, 0x3) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1000000) 01:10:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030300001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:43 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400001) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400001) 01:10:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000577000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1666.574299][ T2672] loop1: detected capacity change from 0 to 140 [ 1666.609623][ T2672] EXT4-fs (loop1): bad geometry: first data block 1114113 is beyond end of filesystem (64) 01:10:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010012000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000480000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:43 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400001) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400001) 01:10:43 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/40, 0x28}, {&(0x7f0000001240)=""/72, 0x48}], 0x4, 0x1, 0x40bb) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1000000) 01:10:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030400001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1666.733437][ T2716] loop1: detected capacity change from 0 to 140 01:10:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000000000ffffff85000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:43 executing program 3: r0 = memfd_create(0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) [ 1666.774073][ T2716] EXT4-fs (loop1): bad geometry: first data block 1179649 is beyond end of filesystem (64) 01:10:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030500001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:43 executing program 3: r0 = memfd_create(0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:43 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x10000, 0x134) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000040)=0x9) fallocate(r0, 0x0, 0x0, 0x1000000) 01:10:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000000000000118c0000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030600001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1666.864438][ T2716] loop1: detected capacity change from 0 to 140 [ 1666.876428][ T2716] EXT4-fs (loop1): bad geometry: first data block 1179649 is beyond end of filesystem (64) 01:10:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010014000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:43 executing program 3: r0 = memfd_create(0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030700001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:43 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1000000) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r2, 0x5451) 01:10:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000fffffffffffffdef000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:43 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030800001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:43 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) fallocate(r0, 0x11, 0xfff, 0x9000000000000000) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) fallocate(r2, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1f) 01:10:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000000000fffffff6000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1667.040021][ T2774] loop1: detected capacity change from 0 to 140 [ 1667.076917][ T2774] EXT4-fs (loop1): bad geometry: first data block 1310721 is beyond end of filesystem (64) 01:10:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030a00001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:44 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b0000000500000001001b000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000000000fffffdfc000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:44 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = memfd_create(&(0x7f0000000040)='!{$\\\x00', 0x2) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r3 = signalfd4(r2, &(0x7f0000000000)={[0xffffffffffffffff]}, 0x8, 0x0) close_range(r3, 0xffffffffffffffff, 0x2) fgetxattr(r3, 0x0, 0x0, 0x0) fallocate(r3, 0x0, 0x2, 0x100) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4, 0x2bac22d0009fd4d5, r1, 0xccaec000) r4 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r4, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0xffffffffffffffff, 0x1) r5 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r5, 0xffffffffffffffff, 0x2) fgetxattr(r5, 0x0, 0x0, 0x0) sendfile(r3, r5, &(0x7f0000000100)=0x169e000, 0x5) fallocate(r0, 0x0, 0x0, 0x1000000) r6 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r6, 0xffffffffffffffff, 0x2) fgetxattr(r6, 0x0, 0x0, 0x0) dup2(r6, r0) 01:10:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000000000fffffdfd000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030b00001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1667.235049][ T2802] loop1: detected capacity change from 0 to 140 [ 1667.259362][ T2802] EXT4-fs (loop1): bad geometry: first data block 1769473 is beyond end of filesystem (64) 01:10:44 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb031800001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000000000fffffffe000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:44 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1000000) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r3, 0xffffffffffffffff, 0x2) fgetxattr(r3, 0x0, 0x0, 0x0) dup2(r2, r3) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x8, 0x1) [ 1667.373429][ T2802] loop1: detected capacity change from 0 to 140 [ 1667.392218][ T2802] EXT4-fs (loop1): bad geometry: first data block 1769473 is beyond end of filesystem (64) 01:10:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb031c00001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:44 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010022000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:44 executing program 4: setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x2, 0x1) r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000240)={0x0, 0xe, 0x0, 0x10000024, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1000000) 01:10:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000fffffffffffffffe000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb032600001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1667.552018][ T2851] loop1: detected capacity change from 0 to 140 01:10:44 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) [ 1667.595394][ T2851] EXT4-fs (loop1): bad geometry: first data block 2228225 is beyond end of filesystem (64) 01:10:44 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) r2 = syz_open_dev$vcsu(&(0x7f0000000040), 0x81, 0x20000) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r3, 0xffffffffffffffff, 0x2) fgetxattr(r3, 0x0, 0x0, 0x0) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) fallocate(r0, 0x0, 0x0, 0x1000000) 01:10:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000000000ffffffff000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb03fe00001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000007ffffffffffff000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1667.685738][ T2851] loop1: detected capacity change from 0 to 140 [ 1667.702899][ T2851] EXT4-fs (loop1): bad geometry: first data block 2228225 is beyond end of filesystem (64) 01:10:44 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030402001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:44 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0xffffffffffffffff, 0x420841) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000240)=""/144) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1000000) 01:10:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010025000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000effdffffffffffff000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030003001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:44 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) write$binfmt_misc(r0, &(0x7f0000000240)={'syz1', "bd93c07a7ab397399db045b43d49eee135a2c28c9309ae3cc9df700804706da9744ee06735136fce5d5015125d01f75af36c0d090fdafdee2afeaecac0ab0196ef7bc8ef943bbaa293c2"}, 0x4e) fgetxattr(r2, 0x0, 0x0, 0x0) write$evdev(r2, &(0x7f00000000c0)=[{{}, 0x15, 0x0, 0x8}, {{0x77359400}, 0x15, 0xf525, 0x87}, {{0x0, 0xea60}, 0x15, 0x9, 0x10000}, {{0x77359400}, 0x5, 0x8001, 0x9}], 0x60) fallocate(r0, 0x0, 0x0, 0x1000000) 01:10:44 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, 0x0) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000feffffffffffffff000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1667.869283][ T2899] loop1: detected capacity change from 0 to 140 [ 1667.896490][ T2899] EXT4-fs (loop1): bad geometry: first data block 2424833 is beyond end of filesystem (64) 01:10:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030204001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1667.943298][ T2899] loop1: detected capacity change from 0 to 140 [ 1667.957276][ T2899] EXT4-fs (loop1): bad geometry: first data block 2424833 is beyond end of filesystem (64) 01:10:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000ffffffffffffffff000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b0000000500000001002e000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030604001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:44 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, 0x0) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb038004001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1668.096344][ T2934] loop1: detected capacity change from 0 to 140 [ 1668.133283][ T2934] EXT4-fs (loop1): bad geometry: first data block 3014657 is beyond end of filesystem (64) 01:10:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000002000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:45 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, 0x0) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:45 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) setuid(0x0) getresuid(&(0x7f00000000c0)=0x0, &(0x7f0000000100), &(0x7f0000000240)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r4) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000280), 0x6e, &(0x7f00000008c0)=[{&(0x7f0000000300)=""/109, 0x6d}, {&(0x7f0000000380)=""/243, 0xf3}, {&(0x7f0000000480)=""/119, 0x77}, {&(0x7f0000000500)=""/66, 0x42}, {&(0x7f0000000580)=""/169, 0xa9}, {&(0x7f0000000640)=""/194, 0xc2}, {&(0x7f0000000740)=""/55, 0x37}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/6, 0x6}], 0x9, &(0x7f0000000980)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa8}, 0x10021) r6 = getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200)={0x0, 0x0, 0x0}, &(0x7f0000001240)=0xc) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r9) r10 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r11) fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000001280)={{}, {}, [{0x2, 0x6}, {0x2, 0x2}, {0x2, 0x1, 0xee01}, {0x2, 0x4, r2}, {}, {0x2, 0x2, r4}, {0x2, 0x3, r5}], {0x4, 0x5}, [{0x8, 0x4}, {0x8, 0x1, r6}, {0x8, 0x7}, {0x8, 0x2, r7}, {0x8, 0x0, 0xee01}, {0x8, 0x4, r9}, {0x8, 0x7, r11}], {0x10, 0x4}, {0x20, 0x1}}, 0x94, 0x3) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1000000) 01:10:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000003000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030005001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1668.213450][ T2934] loop1: detected capacity change from 0 to 140 [ 1668.227019][ T2934] EXT4-fs (loop1): bad geometry: first data block 3014657 is beyond end of filesystem (64) 01:10:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010045000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000004000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:45 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1000000) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r4 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r4, 0xffffffffffffffff, 0x2) fgetxattr(r4, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x84009422, &(0x7f0000002440)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) close_range(r3, 0xffffffffffffffff, 0x2) fgetxattr(r3, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000000240)={0x6, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x20, "1cf3a64e24338a"}) fchdir(r2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000001240)={0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r3, 0xd000943e, &(0x7f0000001440)={r5, r6, "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", "f683530174695ab7597539b3eee990d97b3c949147cc59b6b816d6b40193a6dff6f5b67a279dd30246dcbea83d525302806d43011634a7ed48944625d24a1c6181e30d7be8368654296af8df5ea50fc19c3c4e7cf070d2d0daebefed7b70b008ac917d722dd06f2bd846e850c909d207da727277d270ab30a8e4e0548d190f06a3a640fba0b3d13c1b31e9bce420e838b70f8c382b67ce747088ad0fc6a3bec7218d779e57c7470a321a9a16f1a574bb56675ef90b50038d56d39ec823d5b2fdc08b19394853d27074f950a52b797a7a015c0028d76fd83d643e7b849b7ea7a16b6a7baa28253f78d28492fce10d471b8bd6c3dd620986622f1dba398a1032c36fdd4c16ad85c782b5126c8fd163457b7396ceb3b458babc23de56428a87597ef0fe3ed3777d01869a801f76dfd4b941c8e4a0c65eaf67ae5d76b26bc531f8a226b3f7012f959d67eb384a7f126acdb150bf33b9daca5f3ce24a7339cd55ddda2f51a4e2ddf9ab9aaff3bcadf8cd552e7ce65b74eff31a824e874657128762e29dd425adb02b66bc08903e6246d48be4fd4efc3c43390d1c9fc5199708fe7e895d97186ecd23ffaf956bf1626f4ac0b24096687136712cbeebabb0df22f13912877b548e2b47c96fc73c09675cab0ecb2f8aac795398488a095ce97fb12d833df16e7e954e7e1692eb1f1ee53b9456c42e99ed60e6489d45ebee9155dbc1fc20a2ce2486251e12ee92cfaa26ed1b15e65ce642900f9e7f5b4b5c2ea4546b089413c794a7aad84499a3ae4f7a5f10b211b5d84e4728683b32a53e74b3d8c41996b0cd8639da51ef697ffc6bcb33a069ad91dff1ca701860778c634e06987b8bc335a3c0a7223481b9b11cfd62225e2e5817c3e3ebaf37b063b186a8be409ead4b2333618211c2f6605e0c2f83a96689e250e0d63be15819af514fb511ac62350cc80acae473c98d368797a5773d18c01bc6ab1408dea0f4da9b85586cd31f526c44bd099541a69c0505d4fc79e8f4f81485faf326fed6777153a79196816bb2b1716f854c2c25d464bcf218cd9f99653b4c7ea6aafc1cf3861b992ee589fa5b7752a53844272d53d060860482fa507c528701c830d629ac69c13197cefc9f19d571751f8be4e20ef4549c015a1ecee60af013ef6b178315a9d71f33ebf807b11d7b3082766d68e10db7383a56c120e0a46d73aae84261b31e863a36f5dc6563d98bddf59f50389a158af9f21f6adef6ff5a03577500ddf0a597075f88e97cdd1e5655975a69b1be4ae3d1fd8893f9df7530c3f9bf32787153d71178f4b5a108b09548e105d07fbf04e89bcec87b7a1486ccfcc3a4aed2067080fad172cd1af2ef6c6a8df102893aa4cd58325039284dce539f32f8895c28eb8d4b2b0f004ad795e9aaa7a45165937f019209d76b0c50af006eacc9853a417429d58a20cc1e23c2d364ec74cefccc88f20cfb9e2f49ac9b0dbb176eb654ec3f7b10662773336204cedb8ff3779f9973a5ca98f47a0a6b485f1eee73232c6d17503d1cb387a20bd7786fa93ee92d1501c8f6046f7f4ecce0b6699168bf0baecdfc488d1617bd40837391f9d007554f46ed31612311f24bc0bfcd6e053dcf93e671b99d478b727209c6eeaa014e45769454e682bf989c8d93f6a59dc0c3a4e464895885d54cac908f43b6fdd41121e1f15042ddab951f4f998f8613521e30f74c6736a26743073e49298da4e6d8308bb78c7e5cf4d1fb7209b34f563d29b2edec2b761673eee6747102b42243bb7fbc87f8bccfd4758a2c2876bfe589fc6a14e5ceb7a3b63aa11918b9ca531f931370c80bce4cc7388c39e96ee76dcb14c2d6670e4a79cebe82b6f05916515915525af21478894e1c6c48e8ffc1028ecaee11ed1b366119602cbcddb7e56a1b98f790290a680bbb4ceddd58561e19a65bddb4309af7db8e69dbc51e85eeadb99613db0e5401cb8866940fc8853cc1d0fab3be117885005dc32ac7bd35de5952e74cc3e8837213bc15717c621db659c18464ee4eb387d27bc74ab909c3791b0a28a4b29b9cc4af46f62d51fd03ed9f3f36c540682c8638b910f8f8da778426638bb84682455a560c453907984c8002a4c3c8d523bfeb064670ae1ac95f4aaabfeee7fdd1bd28fea96cce5ca435fc7454bb2cd2939870b185767d3ac27157c5b609bb6ffd819d7f1f314f27e5157d6e01f29983f1c2dd411ae12b7ba654fbd96f554f66a4c0419bb2f60c510a8f8b0fdab53e3ee73d3f878a98f4013192a76554f35e6e137f250ecd26b0dbbc4b63aff055d96cbafe9489d7d970b0b1bd4292e7a22766a63d95950bd81577d3da9d5d630d8352571eba283fbcc998dea3142f3970932764dc107a7a682e7227db24527c7f546414269f269a5e2148f4d2c6f543ef9a65b745b8f652c9932a707355e1db15d671aee42adac60336b0c58efdbea695850b2e998daa49ab5cb9b8a8e58a64331f9eb73be3a1e17fb743cd87f78251ea3a5d290941aa9fe2fe41106efc0a6d64d24b862942fe4b56fc5e9f5b32d086759d1e23d6751b46a4c517ca4884aae3e60108d6332305c2276f985073b96447327d51106f1fd1121553342ff5aa390221423b911ad6b48a996b7d53bfb1cecb5972c536a30d14fc15c51c78f0783161bf08433dca23db486e3fc995879e834303c6a177894b5bc26313591e982a0da7aa798f74f0b663538e8e06d1ea2bf673b6677566cfa80844ab04b1979fa6a2f9288280429b3d2adaa7250b2a0d463fea74107d6e7c315a73883c799f13ec6c5020a3cbffae2146602d8fb2b05f200e78eef1e5c5b0afb2405a13fe350150ceb85a549783b49aeb6d73731aee97013871b0f707212a4ea0b652fb1a6083e1b906b5d98810b0dcbc72e99c0805898a073211176ee84ad988f478a7fa618dfa72074bb6064aaa0e2f2c3f9d9f8f4f6fe8369b2d834e308a304afc2e08e5d1755e281007a110fb756542c12f1d9479a06a27ea1e13f9b918802158f510b34f34068af82c065da655928b7a4f878dd0b52f3a1d2e05c4db4a420c979525de13f5a075dc87b76455ca653ceddfb9ad1a719963f6101d4fb58c695a5fe099965cfa05acb1f44eb2a65733a138ad35443e04fa965896950067a90a508b83e2578ebc3795c4e0ca7c03060934e338ed37e1a5d30e7886490895442c1e76a4638c4dbc841bfb41480380d8ee6e09f3f1a24a30893f4b81b873942f14549ce59af613e97db8c6150b2ec150e9fed89bf0ec267824a8a01b90cdc9a72e8605140c7b5a6b661d0983c65212249f8c2b296c895f4ba1078c57e5a0d75457da88f8554875d9d31b553ae4bf32d16caf0240fb8fdc54c648626d30ab52a615484102408b90830dcffa35a53d3bb763d61db6946be520ba7c28164fdcd3c19b3650911ad0127a98163c260439e8e00c6a7c30e69897773cd2f32d97268327dd7b90220faf585374baa531a238266a1602c5dd3358482bc55e1f762bf2c0bb544867552526bd6f66b99e9bd4602343f27990551969f611ff3b5b655853c75ec86d483d578561ef4d7e8708fb3abff997bbad7c764db7442f3b8370a717ab881d9a72bb8a9148ed2ab1c1cbc353b1be09bc79a80fa83d52d3f2c84483885f1bc3713a523a03d892c9454c6b1a3fee0f075c16b7c46b9c68e4540eee497602c565fa9f295e6dd92d03fb5b24db993ac3c2ca4ea3e7ec49ad4a84135d5c0f0dd288bfab1da07f71965a7c21eb7ee1870f18fee44908ca1697b61fe6681def16c4acdc7d18182266582805322e60faea02eddbd3f020693ffab13443bf7435c3182b09988415b80ef69f4dd9943e939ce9699eaaadb6884fc27a5ed9b92a5c50a68b6ff7d690838c4eb6bd8b25d4d1475246ce98eee3f5dcecaa84e7a360b0aa66508a0eb6342c5e9686dcc212caad1e2d9bb64d02eb71f7fa52438fa558b1c62853f79b4613d248bdf0e030d1234e6edf2a5648a8ffc9964383824857cc2bfdbc0f953f5bff9e6574e897d292c0868e6950a7aa28891ca9aca141cc9574b0831b2e7e00794411282084df9656f2c94ff1336eed91cca99e636d4f7c14976fc84f175eb0e999fad5c66510991f8b1d5ff7d0605a9b0ac7f8963ffb97b1b94788b5961e12f1c462367cb4bfa2adbb3014b651d705eaa1786d075fb45c17ce384e42dd76d4293896421216066f277ea6062fc72e499414f20cd53e02ba0a3f9039b132aba0eb39470b5d9275937ef66614b47ca9268c4176a446cadfd3db02a793e3899760b2bff5707502e6aaecdc4891b7d0ccbaf54fcca49b697a0a59394ed5fba82cd85cb143c46bb5f87431dd7e1bdd2a19d5cf9f5bfe0d1c0f575bc4e309c22791ab6dcfbc39fcfc211e1db7ef6fef359fea58c4f5af64af44fd2be688e557d699e402adea0cf62b2949c8d033a91bd6dcfa76c7fc55585c07503e6d9e526c8ba62978221596c9152e1b4067482ed20b9106c091d74da9b92d551ca7eb3923690bb3959fe35ac2db8b67b2f1a7579011acd6d65d60cb1ad0c3aeeb23bdf579b0f00164587ba57002bbd937b108fb110c2b1abb1581438c962964cb378c798fee724bea14858967515fed39ebc6a052b017f4a8b54fdfc27c78deb16e0d2bc091fac13faea7cecc4cfd0d34d5edaa81bf5d88811bfeef21a945a61e21a061bcc06851d0ad5ec243e8430e48edd5383f9952da8ee401063fc98fb19f8d2e25a64c22ef65532ba9b5cba7352c2d0c365091c0808e63aba8e380e4c57fcd6255bf7944561f85238c36417256c8d904b5810d239bcf73a5e55f3abacfa279975cfd1372230d490fb946398cd9738cdc7d7cc2d44f2941b858194b5e85e76b64053d684aed065ef64b35418bc015a336548aca14333cb24990fc04a821db6275c3860f12251ae886814ff96619a0b572af29e89d82cd0df7de12bf7ecf70a77957136fbd14b4b5eb48a99d3048f0e997844af0490e56b20d1bc863e811a680747c3671c209b90bebcb94821e2599e282c37c9796e562b71cae2e81a814dc6c242f87f79386c0175d110628196d25c528d028eb0afd65c3ba330046a34e4ed927876aea3a3e13d6f05e98b55d0ea806a1e3a25073af31dcf87273949f8237d4c0efbfe8f1723f84d321aaca2ad1a2c85e19258c3439a5eb29bff6b04bcc9016ae005dade67f4c1338109b57aeebad2095748616e841c369481dd55590e79e57969fa50d6e411ee57bb4543b6a7b3dd6db543add53a3b2fc0e5bfb793fb7a79e898e2b23af16e126be3fbb264e70f10f0b909a620a89ed163ededd5649a4873e07de3bd01215a4e2a3c0f441dabe37b9d54c63a5767da68b039501d7f34cf0db22baed56a3dfad390ccff753ca9b034ed8058de24799661ad6059c57300a4957d7fb736d98fa3ede5d"}) sendfile(r1, r2, &(0x7f0000000040)=0xfffffffffffffffd, 0x8) 01:10:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb03a505001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:45 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) [ 1668.345733][ T2973] loop1: detected capacity change from 0 to 140 [ 1668.365522][ T2973] EXT4-fs (loop1): bad geometry: first data block 4521985 is beyond end of filesystem (64) 01:10:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000005000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030006001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:45 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$F2FS_IOC_GET_FEATURES(r2, 0x8004f50c, &(0x7f0000000680)) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1000000) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000006c0)={0x0, 0xffffffffffffffff, 0xe15, 0x2, 0x0, 0x3ff}) close_range(r3, 0xffffffffffffffff, 0x2) fgetxattr(r3, 0x0, 0x0, 0x0) r4 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r4, 0xffffffffffffffff, 0x2) fgetxattr(r4, 0x0, 0x0, 0x0) vmsplice(r4, &(0x7f0000000600)=[{&(0x7f0000000240)="c4a88f4cc55c885887f3025ecb47a375e4e0c5b897d64ff1a0ad1938db22624e9b1eff4d97d273aaefdeb8dccc68e94a414f152015a3786ad443ea958f2cadd77f27c61901989ef4f1bf673e8525ab91163500c49898f70985b5af72abd0e860e95e95426128215942b2d8422389601197abc887f847a1501d4740e84e80918d46fa75b3d47cb6d5a570dd2a7fc347ccd3e7e571979809fe5946cc4e50581fe4ec3e1b5c", 0xa4}, {&(0x7f00000000c0)="0d2e6d54a6843051d908e140021995ac5100669ac7dae234c823967e1ad925f06b115c957eee09e98427091fd95970854b11acf70b0f41f4aa89fe02d57fe25d302ad2cdfada5fcb12beb8cca6c61c8a77be8dba0cac7008ba1a2cc5fcf24f929ad860fae80ab2472349", 0x6a}, {&(0x7f0000000300)="717d7eb31c7605b133e9c14fcc6df50493d5cccfcb014342a42e41e0df", 0x1d}, {&(0x7f0000000340)="edab9299a0007aad12ca1830bd7b2afcbe80eca92c67fb278e8ff2e47582927dc1efc1030eb12a0f76353c9e9d465734a80f9d033943978f47a1660e95c6b6ecebb2fb16e4a31f45db56d12f4f1309d246be7c0f367ffdf2b55c79af46a3a1fa549c1b2e898551620f543848429b25729d1d2ef578e0f284b5188e3197bd97699a24e04f9839088da60b37043c70102e0e76e76fcc326ebf775a84c2c57527f46c81078767687a109cee94a194db82b2214c5c8650f821d6682153234fbe31c6fdab4f447a92f4ff05affed804f09e75fd117e50baaee7aee9360d3e14ef48e1e09716c4cc459e58058f", 0xea}, {&(0x7f0000000440)="f4e9748f23b3022cf273e5c7756f7a4c04cdd6f54f63846ccd736b50567b2d63d56f778e97b86733d9892a65baa50293e44ffbcf654c0e4b4a13c1141b34b6", 0x3f}, {&(0x7f0000000480)="58d94a4848f71110f5571aab207f62ffef0bf7013eb0537b72b1aaf0022c95134dbf5e5debf59c80ebadc4a1137f65341e76be29505321148d1e6334f9d60dbca293f2910deef1c4d688bbe54e7e435fbd0b9426b4ab27529d559d79788f2dfff992bb7d2202707b2c17071dceaf04f70875b0c704b60c1bbd4008e7cbbd3b28fb712357adf74593f9d3e3ba68887a4c194a2a4ab6cd1c46712e87063f626a1b780e67b97db1cf397830568806ba44f3b70ba9637fb65476c2911efe31d4920a2206d002282162c48c61ef13519a", 0xce}, {&(0x7f0000000580)="e5156fc4ae23fe8226bc1ff8784ed94cb952808e5639c84dcb1b6839e6307c3593180f76f4eee6369b6d74bf2f58e1424b6100256e46321d735c3f7e4a91223fd557fd", 0x43}], 0x7, 0xa) ioctl$EVIOCGBITKEY(r3, 0x80404521, &(0x7f0000000040)=""/51) [ 1668.434227][ T2973] loop1: detected capacity change from 0 to 140 [ 1668.441180][ T2973] EXT4-fs (loop1): bad geometry: first data block 4521985 is beyond end of filesystem (64) 01:10:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000006000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:45 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x3, 0x0, 0x1000000) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r5}, {0x0, r5}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {r3}, {0x0, r5}, {0x0, r5}, {r4}, {}, {r3}, {}, {r3}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {r4}, {}, {0x0, r5}, {r4}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4, r5}, {}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {r4}, {0x0, r5}, {}, {r3}, {0x0, 0x0}, {}, {0x0, r5}, {}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {r4}, {r3, r5}, {0x0, r5}, {r3}, {r4, r5}, {0x0, r5}, {0x0, r5}, {}, {}, {0x0, r5}, {r3}, {0x0, r5}, {}, {}, {}, {}, {r4, r5}, {r3, r5}, {r4}, {}, {r3, r5}, {r3}, {r4, r5}, {}, {r3}, {r3, r5}, {}, {}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {r4}, {}, {}, {0x0, r5}, {0x0, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {0x0, r5}, {}, {r4, r5}, {r4}, {}, {0x0, r5}, {r3}, {0x0, r5}, {r4, r5}, {r3}, {0x0, r5}, {r4, r5}, {}, {0x0, r5}, {}, {0x0, r5}, {r4}, {0x0, r5}, {r4}, {}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {r4}, {r3, r5}, {r3, r5}, {0x0, r5}, {0x0, r5}, {}, {}, {0x0, r5}, {r4}, {r3}, {}, {r3}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {r4, r5}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {r4}, {r4}, {0x0, 0x0}, {}, {r4}, {0x0, r5}, {}, {r3, r5}, {r3}, {}, {0x0, 0x0}, {}, {}, {r4, r5}, {r3}, {0x0, r5}, {r3}, {r4, r5}, {r3, r5}, {r4}, {}, {}, {}, {}, {}, {r3}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r4}, {r4}, {r3}, {0x0, r5}, {r4, r5}, {r4}, {0x0, r5}, {}, {}, {}, {0x0, r5}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f000005c780)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}], 0xfd, "79bf3cfdb3e3eb"}) r11 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r11, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r12, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r11, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r12, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r15}, {0x0, r15}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r13}, {0x0, r15}, {}, {r14, r15}, {0x0, r15}, {}, {}, {}, {0x0, r15}, {r13}, {0x0, r15}, {0x0, r15}, {r14}, {}, {r13}, {}, {r13}, {0x0, r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r15}, {r14}, {}, {0x0, r15}, {r14}, {0x0, r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14, r15}, {}, {0x0, r15}, {0x0, r15}, {0x0, r15}, {0x0, r15}, {0x0, r15}, {0x0, r15}, {0x0, r15}, {}, {r14}, {0x0, r15}, {}, {r13}, {}, {}, {0x0, r15}, {}, {r14}, {r13}, {}, {}, {}, {0x0, r15}, {}, {}, {}, {0x0, r15}, {r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r15}, {}, {r14}, {r13, r15}, {0x0, r15}, {r13}, {r14, r15}, {0x0, r15}, {0x0, r15}, {}, {}, {0x0, r15}, {r13}, {0x0, r15}, {}, {}, {}, {}, {r14, r15}, {r13, r15}, {r14}, {}, {r13, r15}, {r13}, {r14, r15}, {}, {r13}, {r13, r15}, {}, {}, {0x0, r15}, {0x0, r15}, {0x0, r15}, {r14}, {}, {}, {0x0, r15}, {0x0, r15}, {r14, r15}, {r13, r15}, {r14, r15}, {0x0, r15}, {}, {r14, r15}, {r14}, {}, {0x0, r15}, {r13}, {0x0, r15}, {r14, r15}, {r13}, {0x0, r15}, {r14, r15}, {}, {0x0, r15}, {}, {0x0, r15}, {r14}, {0x0, r15}, {r14}, {}, {}, {}, {}, {0x0, r15}, {0x0, r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r13}, {}, {0x0, r15}, {r13}, {}, {r13}, {0x0, r15}, {r14}, {r13, r15}, {r13, r15}, {0x0, r15}, {0x0, r15}, {}, {}, {0x0, r15}, {r14}, {r13}, {}, {r13}, {}, {0x0, r15}, {r14, r15}, {0x0, r15}, {r14, r15}, {0x0, r15}, {}, {r14, r15}, {0x0, r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r13}, {r14}, {r14}, {}, {}, {r14}, {0x0, r15}, {}, {r13, r15}, {r13}, {}, {}, {}, {}, {r14, r15}, {r13}, {0x0, r15}, {r13}, {r14, r15}, {r13, r15}, {r14}, {}, {}, {}, {}, {}, {r13}, {0x0, r15}, {r13, r15}, {0x0, r15}, {r14}, {r14}, {r13}, {0x0, r15}, {r14, r15}, {r14}, {0x0, r15}, {}, {}, {}, {0x0, r15}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f000005d780)={0x0, 0x0, "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", "2b4b7c21b61872cf8ace32955309839dbb85a54e2510ec5bf60ec5c9754499aaaa5a05ee28d1dcbd3eaeef61f785e7bdbbfd897af5a67feae122945efa592d6393ead420ce151163cae093d4d7529a538fb2e00ec06b6db04830f0f408527814472dc02b8b11e7a0f40be4963b699d0e30ee09d6df9b0f11f101adcceec3fb50eb7ef6c96be01a6e40d6d5c0369d433d70fd1398dd2f0cdd690719bab3a1eb85a2ebc7eeb0394e367bf0f3208726e6a141b0e8f2b77ffc92225b2cd71ff37079fb6f1744b372735f7d6bd95f0cf3f4f2aeb916bdceeb0183c075a69f3a09a46eef52f5f5169a5b54b68523fb22882d9ec944785ed4ca6258e94ec81e6cdfaa55824befac1f2a10c72bcb2529a4705542b81dc828bea2ec0636a658d3955443bcec969db77597285d9b3f0c72134104785e782cd4dce89bdf40ba5a4fc10d3e9057e96aa07ccee4b24de551810a9dc46c6bff055c93eefb16744055e414958a2be7587ef0580bd2be31e196edc1ccc724d88eed20d776dde011145202c59d04cd2de21548f3885007cfc8a789045df043809c57bc23e8fb3c50db811ca2c8e1f9ad309153a7aaec984168261f21767d900a722ef082e77e04516a258311650da7d67b9473687cac79a90f758c557486edf8b80ff407b205f16a102f9861850cb5b68a614e54a28846b95a7e31e59d45dd46a36b545dee4f7ccc6ec37c7a25b242fcf97304987f7a2ac184061b66527271573957afd60066acee053ed9d8e1b0061d1c6ab82c814d29e5c9442d19b37e3e143100f55846dc169df62c0132712f7985554e299e69ed04738a480960126fa4825e533f4955ff3b981d74b33a3d63f0b8e821bb7405be86e5a7d6a9ee983246b08da6a4004566c9cdf6ab0c325a77717edd7d15f2b3331b8e01754988ac5bbfcab65c0bee737332296426a1e232c1832d55bc26d2354bc51ce4af596e3d1c70ac8e3e51be155b34c9325c2f729a8bc4becb9dba026987720f350061ecaf743d96df51740e788e9e7a57dc645050c5726bee817ad4222146c840d16536a4c37cb2c9233e7d6180f24ed31532d3d022e8c90e921c8dac25cb6dc08e4ba261c6f3f3e4eb2b8395119c86ed5c250fd7cb6ee06e7e0b214a5fe418c7654bcdccd35fbf33da39a42d050d9e8b687f37be226d910926168fb49b939cc0f24f8a5f10f8bdfdb323f301c1d7533ca9b5e80a68f1f0720a726a591d2b06bd47182390801b0d8010e05e610bf52d3e7a6bfe31551fdc4e451c3c29a20209d969bf4d36d2d6e9aab25afe8e9373d5e9503757c73cb3a83457d9dad325c0177ae5303fa79f2c8232b14f15ce4cc00672c9c4eef86904c82a7e975d91d48c165f201efc3abe6353abeb7530df4a99866238c6fff07ca120ac2744fd5f7f5e6621e0e1c24094450ec3aba562d05e7121495c742e179d70ad431ccae96afac25a74f336a950602d5af8ff14030cb076359343a0b0b0089d6e885854a8300ebbacfb7ab19a96c5c326ef6286be273ccaf44860c6d1d98289e920822edc2d73be681dbd4e1c7d9c6911fc5d8305df3067015f3c6c753ca20cf131024ca26e2b835b595710085b7cbf2b4722e173d0060b30449720f9d3969d3878393c61ab8af1bf716c931f7c706950dc439d62184040f836db9b317daf572b38d350c3eb9206fe1ef3b14ac76cbf11fb74a12fda0ebede8b2e206ea2975715a3ee2655d3553167dc1bb75d213f19916fce7fdcc45ba183c16c527873ab3c40d0c1dd2963fad89afbacc0725ab047577db816b77091a9c28cc3c31383c3c29bcbea7ddbae957b56d1a2cab24a8749feeb95dbe0449ec3f5b7a365d034151ef8f8b2017e8b7ec0ab36f4304f24ee9f7cbffc66cc37ce89128960ca025f0831b2a86a37a8df6d040ac5ad966a945634520c5e00905d1fc1917d50911e3f656577a319ea2f2aaa9d2890aadfcd3c3095f1dd5c85e1b40bb171b77f67e8d3c95c2ea953432bd3b41ed3959064edcc3355d112b2dd6966b9297d27f0a35241ea017276f3d351feabdc00ea8565fa41756c55df5cc75285c3e542a7d4dcbcb2b85c311c6edefa4c05147c25a451b0eebea5d825834d8760c8826fe14719e8b3401b68d68b0aa97fc6647aec81ba884b4a95e6f22bbf6bbdd7d0c2eb320388ae0e587baf5692e9dd31a824a8bd036ab3b045f54c1bff4c276e9bed1f9691c31b4e50747d82f26db4d1b52315d69f9f8e9869cae46ee3e0c8240422e4fdf321ccc50f4ba404fac54c9534abf26b220a97a517f55d4dcd0707518f4e6639dcae080503786fd7486a8a207a3684b4f9e27f6dc05e76b81df6e0a0e0306c315a8fd6d99e1d493105b6ef6fb8adeb6919fdad97ef4c902f116b679da966345b613e6f561c7653418f0add2521473b750d20eeaafbfdcffaf8b28266ad3c3d57fba29d4e679e572bff367d091e3f9ab7dc373871e3a453fee1ae0057355814459d25478cf71e1162e5f8115287f3db756696581c90f8ab74ee23e9bfbf9a5687b23738a375ceba43eeabfec3d5efb59c7ccbf46e2054f050866df79c103452c82ca6020ac5e9e47271d2a158d57809d6f3b20235e0c043fd5fb6c85554778f674f134bcbd83a8bc29746dba1bf00cfa46f4ed1131d8c03babc6b57f557c16eb57ea5cd5a40e3dfdb287b9d83a860f131ec26365204ee0e4bb78c094d1532daea852ef89e66b8107736a875a04c16259c807f7e75555e1ab0fe3c847981410db56b7806de4997b7c8d8f1d86ca76e14cac6f694a3a929d553d2ec2a9eb69f97cc944d8554229f17ba2a235c208e3de71c2537d2324045fbdd0cb3412f7ad5be01a0af0095a08df89729b4631f2bcbe978326a589d5d0ad1eecb4bb23bcfafe47ec7a880598f07ec7fc6edcfc6c0aa20bc82f3ada5f8552a8196746ee4067dc391582f83519f3dc3ce4bd2720b1936d8a4791a64a7e2ea6c31fad29b23c8b7bf23bfa7f21e9db74c4ea6df7d2cd041f849f09a5de0b2cb654a2e541eac63aa33d32d1e5c298fcce396a3999dff1aff7f7120315513508dffde2750ea3970c7f682f4077587c6817100b86b5dbe712b097a8a14c661684a27f358ffcd7ac3301319bd4d448dc0f96214754ad1b92473ac2fc0031e1dd3a6e584d0df4267ba0ea8f079cefb981c18001dbe5c0da5d43b5490af14bb45b2985734b10ac43c51fa6e42acfb10704f89760093fc22fadd653ed7fe4d46efe131bc090291520c855f274bb7a1c17513b14c60f9a871d4820a25f29eb6537c575f02e43248537c02fd011b5e1f4114434f8029b8137d8c23a0359fc890a067f6f23ba57d4b2aa8642d7b76c9c0a75cc6f34c522a0c242317a32d26b917c38316492b3b718f9e3cc726c8aa81293ed3ae6c0f54f62c18f39b1847b09e228c7d7e7f1d69039a36ad346cc7ab17223c1afd34ff70b1c8a9c0b17a9eea34f73c5547097ed0b780c0b2350092588dd5df9e9bf30cbe3a33a18c7a92d583678e616219c4b31e80cd40287b92292bd58e5d5e01b3820d006e62ebc8ab3f9417af20ff872a64b7aac8aa22d8af26d9bea7b221fec3108edc26ab10537696efc12a7066cf6a3a753c1875a33beb1baa50042c8f8699f994fbdafdf97b9a2aed414b456a9ee8051e4c234727731ad7ba3f240a751b6e1a2c078f68e1bae9192653305281593e2d8ddcf943f762e1a2d54fc92640f4ee8a655ae06a55744da6aee1215d046697e2189ddc47f4d3fc22f5ce3971538a02c9f12840555fe6e7e24b9d2ece3628d9eea5c864111e705eaa9fdf21732cba414d683b76a64fe30d1140c67cca1e056a66f9434dec7178719d5e912615da0c945725af34ac90f32e4a83f3ebb6916a013e3a1359e00536ae6502a1c4b8f02ffc5b56b81dcc5b28fb04495d2ba1adeb0091aa5eeaa8d3b3bf2d349c8d37e781f82b1c2307871b4de129b0ed85091b6b25b7688eaaa16e416790543d05b7315f317fb0c00ed29a17e81bdcae6e2200366b1dca743e42b807248aa3bc3de462829f06c37b59c91c63c7aa87cefa6abc0e73a3cb36cccbb9dc292bc52263a1a20bd03fc08afef3215da1b9a12296b80872b0f88cf6acedf0b59b985d50a29771b5b3f7dcc10eb1cafff8eec1ab22b5c8b38ce7fb3a7bbd585ce703406adf421286a902a6b946f135bfa5fe733080896a1ef6e6cab4661f0a7c5f84da016dd8901252bc900567700314a597567555aa2c2438cfc9b44e7074b7bcd8cbac31bf65fe795535672b4c7b1d7d5e03252e4236704c655ef1eeca01c8efa61c6c9a469fe2eb71427207ab594d51a9622bd9e27ef000c8e29ce3babd1ce039b785cc23a50f77e4f19c2f361c0117eaf7e29e68d1f51350ff7d00374e2c4114f06a0bcd23b3b9791e38d7290a6447b9a253dd3d6b8ce657b08c257ca1cb89a1692f811c697f1e0280f2e2dc1f307318edf092c9700c46467cd900a22f0c794c09a64f263fa16b45f367f4a6688ae089daa9960d355abbd14400083624e4d6b32ee5b698d137cdb9ef8aa25d7742760e5671bd619c51b336dfa0fd3e5417617a4e3c56c17d59a95b40ab1fbb9358230e66fc5f723f28f56b5a6d4d5b43ff379b6690e6a9342eed2af80a0aad565b990776f97b67e83eed1f1e99784abddac81d3e25995afc77beb4a1d5973dae0fd9306d9836b94b0948e5b48f5f7823cbebaf3b8941b4ef13482577164974adeb66642ca23c5e8ea64eb1f84a7c346dca671a8cbc9b8f97cd506a081c4a5b5f49318a721b0cb9b9244463d809e0abdcc9917b552f8ac4be63b7037ab81340ca82f43a8eee389c878e3687902a93511e87c0c756f2a7c429a28bf6068aab9aba182755fa78c94f5cabbf36ba31aaacad8c158345178df88fd4607e4d9ec9259aec8f5e81294f73a644da99f0bb565c39a06e3c30ba135f6d6d9174c0de941e9cf6d0039de4f45f332e513552ed980f712ef1805f0993d028f320d12c691e175a3ceef8478846af5cc116e86474c7630a3e5fda72563c8eee914193d8648bad0963d93b4ebeae0379f35e896907f5a2ba0d93b332da71c7cb9ec5d9eb1b00638dc862412591336dd828e311dac687bd2b6ac332115d62a15c08fb83182397f852eb296b3fbafed100e333af5bf7e74b234ef04df60c61ab9ca59587d6dfb43af82e73f4a72f1209b5bf2c9a9f5e72d05caabcabbf5a12ddacfe732823c060af523571b8aaf45a78b93cf28a7306c1f9c7fb2d17c00645ec021625dd6f915ab410f546b8d72254f985762b100b721a6af0248ef98d0245b8f2c5475a8bd298758dadb95b2cc383846bb3b30d4ec081c42a1542daa9ec0a34009f74459d4693019a51b8cb29f616c92ae3c564d135a043fc31ef1cddfd2017e6297a057307d13fa5814db64c2fb8d9e0a2"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f000005e780)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f000005f780)={0x10001, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4, r10}, {}, {}, {r14, r16}, {r17}], 0xff, "908c11decec575"}) 01:10:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010046000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030406001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:45 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:45 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x3, 0x0, 0x1000000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/class/msr', 0x40040, 0x10a) dup2(r2, r3) signalfd(r0, &(0x7f0000000040)={[0x1]}, 0x8) 01:10:45 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) r2 = signalfd4(r1, &(0x7f0000000040)={[0x1]}, 0x8, 0x800) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r2, 0x10e, 0x2, &(0x7f00000000c0)=0xf9, 0x4) fallocate(r0, 0x0, 0x0, 0x1000000) 01:10:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000007000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000008000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030007001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:45 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) [ 1668.607054][ T3015] loop1: detected capacity change from 0 to 140 [ 1668.644200][ T3015] EXT4-fs (loop1): bad geometry: first data block 4587521 is beyond end of filesystem (64) 01:10:45 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0xfd, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1000000) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000100)={0x52, 0x8, 0x0, {0x6, 0x8}, {0x1, 0xc1f}, @rumble={0x8000, 0x9}}) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r3, 0xffffffffffffffff, 0x2) fgetxattr(r3, 0x0, 0x0, 0x0) ioctl$EVIOCSFF(r3, 0x40304580, &(0x7f00000000c0)={0x54, 0x400, 0x1, {0x7, 0xfff}, {0x8, 0x1}, @period={0x5a, 0x0, 0x7, 0x3, 0x4, {0x6, 0x2, 0x1, 0x1ff}, 0x7, &(0x7f0000000080)=[0x0, 0x20, 0x95e3, 0x0, 0x0, 0x1, 0x5]}}) 01:10:45 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x3, 0x0, 0x1000000) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) 01:10:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000000a000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1668.705612][ T3015] loop1: detected capacity change from 0 to 140 [ 1668.740015][ T3015] EXT4-fs (loop1): bad geometry: first data block 4587521 is beyond end of filesystem (64) 01:10:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010048000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb03000a001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:45 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r2 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) fallocate(r2, 0x0, 0x0, 0x400001) fallocate(r0, 0x3, 0x0, 0x1000000) 01:10:45 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000000b000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:45 executing program 4: ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) write(r0, &(0x7f0000000040)="83541b74949f4e719a6cfad58aa4ae0a10b8aead9cb17878d46678298fd235ca01eeddf487764c51512ffb23706a8edce1d5", 0x32) r1 = syz_open_dev$evdev(&(0x7f00000000c0), 0xfffffffffffffffe, 0x8500) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000380)={0x15, 0xa6, &(0x7f00000002c0)="e47d5274c188bc27132bda3e11df5d358090d9c9be1f14a5c7015cbdf6bb22465aa7b0f4c227ce9a65c86c570735e2e8766c7bf52a989bc1a41fff076a517df4b8f7a2b635eda77933c72348dca2c4145832a7d49bcda7d04cdef112c63f18cbabb7782ae4651fc1746862dbfbb6ea48091b59a3edd58d6bdfaa6b911b822a620675e5878cde56319da6fe3ddbef424eee10fd9b4ba2229fc0f835d5b896b6d4f0767d37be88"}) fallocate(r0, 0x0, 0x0, 0x400001) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x34, r3, 0x401, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_STA_WME={0xc, 0x81, [@NL80211_STA_WME_MAX_SP={0x5}]}]}, 0x34}}, 0x0) sendmsg$NL80211_CMD_GET_KEY(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x28, 0x0, 0x408, 0x70bd29, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x5, 0x5a}}}}}, 0x28}, 0x1, 0x0, 0x0, 0xc041}, 0x4050) ioctl$BTRFS_IOC_INO_PATHS(r4, 0xc0389423, &(0x7f0000000400)={0x5, 0x30, [0x10001, 0x1, 0xffffffffffffffc1, 0x1], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) fallocate(r0, 0x0, 0x0, 0x1000000) 01:10:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000018000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:45 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r1, 0x19, 0x2, 0x3ffffe) fallocate(r0, 0x3, 0x0, 0x1000000) 01:10:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb03000b001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1668.867515][ T3071] loop1: detected capacity change from 0 to 140 [ 1668.892568][ T3071] EXT4-fs (loop1): bad geometry: first data block 4718593 is beyond end of filesystem (64) 01:10:45 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000001c000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:45 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x13, 0x2f, 0x6, "ed040000000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x10, 0x0, 0x400001) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x260000, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(r2, 0x941c, 0x0) fallocate(r0, 0x3, 0x0, 0x3) [ 1668.993858][ T3071] loop1: detected capacity change from 0 to 140 [ 1669.007931][ T3071] EXT4-fs (loop1): bad geometry: first data block 4718593 is beyond end of filesystem (64) 01:10:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b0000000500000001004c000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:45 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x208283, 0x40) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1000000) 01:10:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030018001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:45 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:45 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r1, 0xffffffffffffffff, 0x2) fgetxattr(r1, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCGBITSND(r2, 0x80404532, &(0x7f0000000240)=""/4096) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x3, 0x0, 0x1000000) 01:10:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000026000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb03001c001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:46 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000019c0)=[{{&(0x7f00000000c0)=@abs, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001a80)=""/254, 0xfe}, {&(0x7f0000000340)=""/145, 0x91}, {&(0x7f0000000040)=""/34, 0x22}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000001400)=""/31, 0x1f}, {&(0x7f0000001440)=""/22, 0x16}], 0x6, &(0x7f0000001b80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000402000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYBLOB="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"], 0x90}}, {{&(0x7f00000015c0)=@abs, 0x6e, &(0x7f0000001940)=[{&(0x7f0000001640)}, {&(0x7f0000001680)=""/136, 0x88}, {&(0x7f0000001740)=""/202, 0xca}, {&(0x7f0000001840)=""/57, 0x39}, {&(0x7f0000001880)=""/12, 0xc}, {&(0x7f00000018c0)=""/68, 0x44}], 0x6}}], 0x2, 0x2002, &(0x7f0000001a40)={0x77359400}) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x8, "ed005400004000800000e20202000000040000220000000000008600"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1000000) [ 1669.139212][ T3124] loop1: detected capacity change from 0 to 140 01:10:46 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x60400) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x3, 0x0, 0x1000000) 01:10:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000fe000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:46 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030020001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1669.188288][ T3124] EXT4-fs (loop1): bad geometry: first data block 4980737 is beyond end of filesystem (64) [ 1669.274008][ T3124] loop1: detected capacity change from 0 to 140 [ 1669.292465][ T3124] EXT4-fs (loop1): bad geometry: first data block 4980737 is beyond end of filesystem (64) 01:10:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010060000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:46 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8000) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r1, 0x8008f512, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x7) memfd_create(&(0x7f0000000080)='!@\x00', 0x0) 01:10:46 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r1, 0xffffffffffffffff, 0x2) fgetxattr(r1, 0x0, 0x0, 0x0) r2 = openat$incfs(r1, &(0x7f0000000040)='.log\x00', 0x8000, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000000, 0x10, r3, 0x5d62f000) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f00000000c0)=""/77) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x1, 0x9, 0x0, 0x24, "ed005400df0000010000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x3, 0xfffffffffffffffc, 0x3) 01:10:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000004020000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030026001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:46 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb03003f001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000030000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:46 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) write$binfmt_elf64(r1, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0x20, 0x40, 0x24, 0x6, 0x2d3, 0x3, 0x3e, 0xde9c087, 0x19, 0x40, 0x15c, 0x3, 0x1, 0x38, 0x2, 0x7, 0x1, 0x4}, [{0x60000000, 0x5, 0x5, 0x800, 0x8, 0x3, 0x8, 0x7ff}, {0x6474e551, 0x1587153f, 0x0, 0xff, 0x927, 0x2, 0x10000, 0xffffffffffffffff}], "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", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x16b0) fgetxattr(r2, 0x0, 0x0, 0x0) lseek(r2, 0x7, 0x1) write(r2, &(0x7f0000000040)="1b5991508b8de518d035e64d47b8b60e335d2ba043a61e6caa052e853d6afac29bd88e5d2f", 0x25) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x3, 0x0, 0x1000000) 01:10:46 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1000000) syz_open_dev$vcsu(&(0x7f0000000040), 0x400, 0x500) creat(&(0x7f00000000c0)='./file0\x00', 0x76) 01:10:46 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x400001) [ 1669.398014][ T3173] loop1: detected capacity change from 0 to 140 [ 1669.428765][ T3173] EXT4-fs (loop1): bad geometry: first data block 6291457 is beyond end of filesystem (64) 01:10:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000002040000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1669.523028][ T3173] loop1: detected capacity change from 0 to 140 [ 1669.529756][ T3173] EXT4-fs (loop1): bad geometry: first data block 6291457 is beyond end of filesystem (64) 01:10:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010068000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030040001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:46 executing program 4: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r1, 0xffffffffffffffff, 0x2) fgetxattr(r1, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x2c, r0, 0x200, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void, @void}}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x50}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r1}, @NL80211_ATTR_IFINDEX={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) r2 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r3 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r2, 0x0, 0x0, 0x400001) r4 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r4, 0xffffffffffffffff, 0x2) fgetxattr(r4, 0x0, 0x0, 0x0) r5 = syz_io_uring_complete(0x0) getresuid(&(0x7f0000000340)=0x0, &(0x7f0000000380), &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0xa25040, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@access_client}, {@uname={'uname', 0x3d, 'nl80211\x00'}}], [{@dont_hash}, {@euid_gt={'euid>', r6}}, {@fowner_lt={'fowner<', 0xee01}}]}}) fallocate(r2, 0x0, 0x0, 0x1000000) 01:10:46 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x3, 0x0, 0x1000000) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000040)={0x2, 0x14, 0x0, 0x1f, "f9f54a64fd32a1d8a6bb5e778b3592cf279cb5166431fbc1ab9ba3a2582878c2"}) 01:10:46 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400001) 01:10:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000006040000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:46 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400001) 01:10:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030480001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1669.651848][ T3223] loop1: detected capacity change from 0 to 140 [ 1669.689513][ T3223] EXT4-fs (loop1): bad geometry: first data block 6815745 is beyond end of filesystem (64) 01:10:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000080040000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:46 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fgetxattr(0xffffffffffffffff, &(0x7f0000000040)=@known='user.incfs.size\x00', &(0x7f0000000240)=""/198, 0xc6) fallocate(r0, 0x3, 0x0, 0x1000000) 01:10:46 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000040)={0x1, 0x9, 0x6, 0x80000000, "5496a7dd0b7c3110595d335358b4baf975386a8322264ef9d3213ed40d41a625"}) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, "ed005400000000003ec13e20000000000000001f00"}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000)={[0x8]}, 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f00000000c0)=""/106) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400005) fallocate(r0, 0x0, 0x0, 0x1000000) 01:10:46 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400001) [ 1669.755518][ T3223] loop1: detected capacity change from 0 to 140 [ 1669.766356][ T3223] EXT4-fs (loop1): bad geometry: first data block 6815745 is beyond end of filesystem (64) 01:10:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b0000000500000001006c000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb0305a5001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000050000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:46 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00j\x99\x1f\x1aj\xebbP\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xff\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x10G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf5f\x12[\xf9w\a\xec\x00\t<`\x84):\x8f|\x8f\x06\xf8T', 0x2) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x80024, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f00000000c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x3, 0x0, 0x1000000) 01:10:46 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x0) 01:10:46 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0xfffffffffffffffe, 0x501000) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000040)={0x4, 0x11, 0x5ae, 0x9, "eb5718645dc95b0873173b25f1028c3d426305c67c80431fe9bd9f47c79dddf2"}) fallocate(r0, 0x0, 0x0, 0x1000000) 01:10:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000077050000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb03fffe001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1669.887783][ T3273] loop1: detected capacity change from 0 to 140 [ 1669.906820][ T3273] EXT4-fs (loop1): bad geometry: first data block 7077889 is beyond end of filesystem (64) 01:10:46 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x0) 01:10:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000060000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:46 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x7, 0x3, 0x0, 0x24, "ed005400"}) fallocate(r0, 0x0, 0x0, 0x400001) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000040)={0x20, 0xb, 0x9b9, 0x442d, "d5fba7fe8c06cedf3ad874023e13e624cab5398c420439e8d24893d8cb47c2d1"}) fallocate(r0, 0x0, 0x0, 0x1000000) 01:10:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb03feff001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1670.013301][ T3273] loop1: detected capacity change from 0 to 140 [ 1670.032858][ T3273] EXT4-fs (loop1): bad geometry: first data block 7077889 is beyond end of filesystem (64) 01:10:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010074000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:46 executing program 2: mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4, 0x80010, 0xffffffffffffffff, 0xa89e4000) r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000240)=""/4096) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x3, 0x0, 0x1000000) 01:10:46 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1000000) r2 = gettid() fcntl$setown(r1, 0x8, r2) 01:10:46 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x0) 01:10:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000004000000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000004060000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb03fffffffe00000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000070000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:47 executing program 4: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffff, 0xfff, 0x6}) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x840, 0x100) r1 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) write(0xffffffffffffffff, &(0x7f0000000240)="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", 0x1000) r2 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000000)={0x0, 0xff, 0x0, 0x25, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r1, 0x0, 0x0, 0x400001) fallocate(r1, 0x0, 0x0, 0x1000000) 01:10:47 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x2000000003, 0x240100) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000d00eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x3fffff) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x104) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r3, 0xffffffffffffffff, 0x2) fgetxattr(r3, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000580)=ANY=[@ANYBLOB="de0bcb9db49705354ae3cdc84bc4c47f3a5de28975aa45e9f8d9ad58d86ff8f9860b4aa802592cbe533d4683bd9953a6bd3b5ab0d3cad7fcab965f0ad4e76e350ce783c5", @ANYRES16=0x0, @ANYBLOB="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"], 0x1b8}, 0x1, 0x0, 0x0, 0x800}, 0x10) ioctl$BTRFS_IOC_DEFRAG(r1, 0x50009402, 0x0) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000100)={0x55, 0x9, 0x7, {0x8df, 0x7fff}, {0x100, 0x77}, @period={0x5a, 0x0, 0xfd, 0x7, 0xfff9, {0xffc1, 0x1000, 0x684, 0x5}, 0x1, &(0x7f00000000c0)=[0x8]}}) r4 = socket$packet(0x11, 0x2, 0x300) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFCONF(r6, 0x8912, &(0x7f0000000100)=@req={0x28, &(0x7f00000000c0)={'veth0\x00', @ifru_addrs=@xdp={0x2c, 0x0, 0x0}}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f00000004c0)={'sit0\x00', &(0x7f0000000440)={'syztnl2\x00', r7, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @loopback}}) sendto$packet(r2, &(0x7f0000000500)="cffebd13fd419ea8f3b2a46cfc83c1af74db61c7e2579f04e52bc4cf64a2ece511f1e216cbf847186f470ea130298ee43317a8ff5481ce7c932836b9fe6d0ee115188b14a8e8037e50cf85750f2bef2824feac6a5937805d1aa41abe6359177dc7a0", 0x62, 0x4040, &(0x7f00000002c0)={0x11, 0x1, r7, 0x1, 0x2, 0x6, @multicast}, 0x14) sendfile(r2, r4, &(0x7f0000000240)=0x8001, 0x3) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000003c0)={'erspan0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r7, @ANYBLOB="07000080fffffc00ffffffff401a008000640000062f9078ac1414aae00000019404000000442c0143e0000002000000096401010000000001ac1e0001000000030a01010200001b03ac1414aa000000089404010044346603ac14140bffffffffe000000200000101ac141440000000000a010100000001ff0000000000000401ac1414aa00000001000000"]}) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000800)={@empty, @private0, @private0={0xfc, 0x0, '\x00', 0x1}, 0xfffffff9, 0x3f, 0x33, 0x400, 0xbb2, 0x40800000, r8}) [ 1670.163081][ T3321] loop1: detected capacity change from 0 to 140 01:10:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030002001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:47 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) ioctl$BTRFS_IOC_QUOTA_RESCAN(0xffffffffffffffff, 0x4040942c, &(0x7f0000000040)={0x0, 0x1, [0x1, 0x8, 0x80000000, 0x2, 0xa000000, 0x5]}) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f00000000c0)={0xf7, 0xf, 0x4, 0x1, "f04f2017befab99b54caa2fe7886f63fa9c61fc123462e072db4074e88445ded"}) fallocate(r0, 0x0, 0x0, 0x1000000) [ 1670.218265][ T3321] EXT4-fs (loop1): bad geometry: first data block 7602177 is beyond end of filesystem (64) 01:10:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010076000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000008000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030003001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000000a0000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:47 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240), 0x48040, 0x0) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r6) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r8) r9 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r9, 0xffffffffffffffff, 0x2) fgetxattr(r9, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)=[{&(0x7f0000000340)={0x4c, 0x3b, 0x300, 0x70bd26, 0x25dfdbff, "", [@generic="9a141fed3759ee182be9869ae83d946b76af94814908f61d496a7cb0464f9569f32d688e9e42473d80211c1f9711c31b906e3ca0016319d162763d"]}, 0x4c}], 0x1, &(0x7f0000000500)=ANY=[@ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=r4, @ANYRES32=r6, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r8, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32=r9, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="9600000000c65f61e5f6d0a100001e93041d00c570"], 0xa8, 0x8800}, 0x4000000) fallocate(r0, 0x3, 0x0, 0x1000000) 01:10:47 executing program 4: ioctl$BTRFS_IOC_LOGICAL_INO_V2(0xffffffffffffffff, 0xc038943b, &(0x7f00000006c0)={0x5, 0x40, '\x00', 0x0, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r1, 0xffffffffffffffff, 0x2) fgetxattr(r1, 0x0, 0x0, 0x0) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) pwritev(r2, &(0x7f0000000040)=[{&(0x7f00000000c0)="0b7e10839e2e25e5daf25bfba0946615c74ef0f76b5b443a11ddcca9160d9dc0289ac4c2aa26e4cf9b5f03818ac6886e06b61f5df16da0fa9b05b2214deffba67fcd0211408550acd35fc01af4488302a7729ab6a9d05834f5ff9b537660e01d442e6bac", 0x64}], 0x1, 0x9, 0x3) r3 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1000000) r4 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r4, 0xffffffffffffffff, 0x2) fgetxattr(r4, 0x0, 0x0, 0x0) ioctl$PIO_FONTX(r4, 0x4b6c, &(0x7f0000000640)={0x172, 0x1, &(0x7f0000000240)="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"}) [ 1670.312908][ T3321] loop1: detected capacity change from 0 to 140 [ 1670.320836][ T3321] EXT4-fs (loop1): bad geometry: first data block 7602177 is beyond end of filesystem (64) 01:10:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030004001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000000b0000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:47 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) write$binfmt_misc(r1, &(0x7f0000000040)={'syz0', "def30dfcc75039f3517fe8dba7dd7b4970f91802e8feb5d960dc58fbb7f4defbdbefd4f35c95f9cb120b574bcf007f"}, 0x33) r2 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000100)={0x7, &(0x7f00000000c0)=[{0x9, 0x5, 0x1f, 0x3ff}, {0x6, 0x1f, 0x37, 0x5af8}, {0x40, 0x86, 0x7f}, {0xd11, 0x0, 0x0, 0x1}, {0x6, 0xa5, 0x5, 0x3f}, {0x4, 0x7, 0xd9, 0x7}, {0x9, 0x1, 0x1f}]}) fallocate(r3, 0x35, 0x0, 0x400001) fallocate(r0, 0x3, 0x0, 0x1000000) [ 1670.396946][ T3367] loop3: detected capacity change from 0 to 140 [ 1670.414533][ T3377] loop1: detected capacity change from 0 to 140 [ 1670.433960][ T3367] EXT4-fs (loop3): fragment/cluster size (262144) != block size (1024) 01:10:47 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) write$binfmt_elf32(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46067fe003010000000000000003003e00080000005a010000380000008b030000010000e7de8949b6afb25300ff7f0400000000000000006001010000000000000000000009000000ff0700009200000008000000010000001bc40000eadc00008200000007000000220d0000000800000100008074e1be07765a855ad3618daa9c24b717cd1e36dab2add980dd18e41e53839f3f32b136d7971b7b717c3858716a8a0ca397d9358897cae24254cc2fde85c33a91a5d84f0339828675bdf01fe05f32b93298c3fd2fc4021a811e622bf9e47604ea2533baa52add1b3d917ff268"], 0xe4) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x44, 0x0, 0x1000) fallocate(r0, 0x0, 0x0, 0x1000000) 01:10:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030005001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:47 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$vcsu(&(0x7f0000000040), 0x9, 0x701) getpeername$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) write$binfmt_elf32(r0, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x20, 0x8, 0x6, 0x2, 0x3, 0x6, 0x8840, 0x58, 0x38, 0x9d, 0xffff, 0x2, 0x20, 0x1, 0x5, 0x1000, 0x7}, [{0x5, 0x3, 0xfffffff7, 0x7, 0x9, 0x4, 0x1f}, {0x7, 0x80, 0x401, 0x2b06, 0x7, 0x6, 0x9}], "132322a7e1a0567544aedb855a812dcab237b5b5eddb35a3e6b5d911f6af6b8f4c99679f63647b56d00cd4830180493b42dbc957a495c831819f0a7ff63c3e70f5b6062faede6130b0442ed6492239b828f88654bf23ef6f66ff78fda7a839697ae7d55f4c5665d432a1a239ae6bde3ce6e5cced2d89f32e2c3871b25a8aea3bd8268267c66686f7506e75557fa239d800e4f0634cabc305f04e78a5646c4fffd75bd56af613130dc70c3f72b54310e3b92a3961d9e8fcc68a7a7a509fe278202bc4cfdd7875e4284230667dbf7aa5841c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x749) r2 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fcntl$addseals(r1, 0x409, 0x4) fallocate(r0, 0x0, 0x0, 0x400001) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r3, 0xffffffffffffffff, 0x2) fgetxattr(r3, 0x0, 0x0, 0x0) r4 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r4, 0xffffffffffffffff, 0x2) fgetxattr(r4, 0x0, 0x0, 0x0) dup3(r3, r4, 0x80000) fallocate(r0, 0x3, 0x0, 0x1000000) [ 1670.457707][ T3377] EXT4-fs (loop1): bad geometry: first data block 7733249 is beyond end of filesystem (64) 01:10:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010077000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:47 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x100000000000000, 0x0, 0x1000000) 01:10:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000180000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:47 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x22, 0x117641) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) pread64(r2, &(0x7f0000000240)=""/222, 0xde, 0x10001) fallocate(r0, 0x0, 0x0, 0x400005) fallocate(r0, 0x0, 0x0, 0x1000000) r3 = openat$cgroup_devices(r0, &(0x7f0000000080)='devices.allow\x00', 0x2, 0x0) fallocate(r3, 0x0, 0x0, 0x0) writev(r3, &(0x7f0000000100)=[{&(0x7f00000000c0)="55e00e63cc95ffcfcafe08d7b849eb16c682260dc6c9b46384f6986c081ecf3c044025cde3f0", 0x26}, {&(0x7f0000000340)="b4a9eceee1f775c3266a9614aea5ae3bb173083bb1f58365fc1f7dd3c737edbf9b3c04bdbd8237844da641e67a8aec90ecf0398c7a54df2d85eabd499ac9d346787c8160d5ef714bd9c3f0ea2270ea6016b45c033dfd7f3f479d0d7175c4398b77737dee6dfe31b9dab1a8dcd9dd12e272c7f9c04b25310df1ac1189db", 0x7d}], 0x2) r4 = dup(r1) ioctl$EVIOCGSW(r4, 0x8040451b, &(0x7f00000003c0)=""/174) r5 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r5, 0xffffffffffffffff, 0x2) fgetxattr(r5, 0x0, 0x0, 0x0) flistxattr(r5, &(0x7f0000000480)=""/124, 0x7c) 01:10:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030006001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1670.542089][ T3377] loop1: detected capacity change from 0 to 140 [ 1670.552198][ T3377] EXT4-fs (loop1): bad geometry: first data block 7733249 is beyond end of filesystem (64) 01:10:47 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x100000000000000, 0x0, 0x1000000) 01:10:47 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x100000001) fallocate(r0, 0x0, 0x0, 0x1000000) 01:10:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030007001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000001c0000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:47 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x6, 0x101840) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1000000) [ 1670.645219][ T3428] loop1: detected capacity change from 0 to 140 [ 1670.666935][ T3428] EXT4-fs (loop1): bad geometry: first data block 7798785 is beyond end of filesystem (64) 01:10:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030008001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:47 executing program 3 (fault-call:4 fault-nth:0): r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) [ 1670.707016][ T3428] loop1: detected capacity change from 0 to 140 [ 1670.719362][ T3428] EXT4-fs (loop1): bad geometry: first data block 7798785 is beyond end of filesystem (64) 01:10:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b0000000500000001007a000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000200000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:47 executing program 4: ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, &(0x7f0000000040)={0x0, 0x8}) r0 = memfd_create(&(0x7f00000000c0)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x94\xc5\xd2\x04\xfc\x9c\xc2\xa8\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1000000) 01:10:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb03000a001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000260000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1670.833597][ T3464] loop1: detected capacity change from 0 to 140 [ 1670.859929][ T3464] EXT4-fs (loop1): bad geometry: first data block 7995393 is beyond end of filesystem (64) 01:10:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb03000b001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000003f0000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:47 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b0000000500000001007e000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030018001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1670.968124][ T3485] loop1: detected capacity change from 0 to 140 01:10:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000400000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:47 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x2, 0x0, 0x400001) 01:10:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb03001c001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1671.025795][ T3485] EXT4-fs (loop1): bad geometry: first data block 8257537 is beyond end of filesystem (64) 01:10:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000005770000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1671.094829][ T3485] loop1: detected capacity change from 0 to 140 [ 1671.122653][ T3485] EXT4-fs (loop1): bad geometry: first data block 8257537 is beyond end of filesystem (64) 01:10:48 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) memfd_create(&(0x7f0000000040)='%\x00', 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1000000) ioctl$BTRFS_IOC_DEV_REPLACE(r1, 0xca289435, &(0x7f0000000240)={0x2, 0x3, @start={0x0, 0x1, "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", "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"}, [0x1, 0x6cb, 0x8, 0x3, 0x2, 0x1, 0x6, 0x2, 0x6, 0xfffffffffffffffd, 0xffffffff, 0x10000, 0x7, 0x0, 0x1a1, 0x7, 0x20000000000, 0x3f, 0x7ff, 0x4, 0x7ff, 0xfffffffffffeffff, 0xa0, 0x0, 0xa, 0x1c2, 0x9, 0x8, 0xffffffffffff630f, 0xffffffffffff8b46, 0x8, 0x5, 0x80, 0xfb, 0x8000, 0x7, 0x10001, 0x80000000, 0x5, 0x23, 0x2, 0xee, 0x9, 0x4, 0x3, 0xfff, 0x6fd4b7aa, 0x380000000, 0x9, 0xfff, 0xfffffffffffffff8, 0x7, 0x7, 0x6, 0x9, 0x401, 0x7fff, 0xa9c3, 0x100000001, 0xff, 0x8, 0x200, 0x4, 0x7]}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f0000000c80)={{r0}, 0x0, 0xa, @inherit={0x78, &(0x7f0000001c80)={0x1, 0x6, 0xa709, 0x9, {0xc, 0x6, 0x0, 0x101, 0x7}, [0x2, 0xf5a, 0x8, 0x1f, 0x4, 0x9]}}, @devid=r2}) r3 = syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x8, &(0x7f0000004140)=[{&(0x7f0000001d00)="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", 0x1000, 0xc06}, {&(0x7f0000002d00)="a7f10dcc3cfb20d3cef0a20dc0cc3ecf886a2b64d77e1ba7809a954bf3670ec1b53808578ef07bcc20fc253f45cf43b3f7e44d40c1f13250803d2e8f3bff2da63fa3cdf4f8a1c51a856aa60d3e58ff4065fbe2ed847fa8793e20a58e99f6448f1e3f592c42f4fc904b1f7e7436c6075a77a7d2d98e9ae13a638c39d944e32f04ddd9ab7ab6fefd6f454fc0462364ef9fdb750de225d9a7b4e84a933268f6a5a554e9e4d83aeac8f9db261ebf4488fd7e1b80749477005a37d52c86fb194f09d0d760c797af6069f8ef28a497eee8adef75626faf0c", 0xd5, 0x6}, {&(0x7f0000002e00)="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", 0xfd}, {&(0x7f0000002f00)="ac316e20ecdd2a384adcaab00520c07dde02f8d838362364dd1db6c65a9773425a01cdf8ea60510d905a092e296825c3c40cfc19cf5c1126a0790d4953d4fd0dbed068e00b4de6b4c6d9901041f8e8a10f8e155a7724d3c2bc159fa8fd6982b819ae5dedcd4cf3c47289b94934fd75c4fde99756be402ce25dcb19836234cade326daf894df4f59ad5c23a2aea241af30faebefeb376d4c42c1fb4036bec13481c3861996ffb0b36f5397347b60cca29097ca6a3162df44d73fd29cf990641a252ef7107f58361e359957ff5db2b6742f182bdf3a9280dd1aaaca21cbd2dcd27b316881a3ff9859ae675d9", 0xeb, 0x2}, {&(0x7f0000003000)="58f2127e8d20ded038f4772d2affc56e2204e55ec7e3fdd2527d4877735a61ba1494f993911283dd0e13a7abc61566c2da32c30130ff8bfcdcfa4f57168ec3ce9645f94597263a1656237d3239fc238ba4ac793855014f4510fc3100", 0x5c, 0x7}, {&(0x7f0000003080)="74408ae24ad75b0e61ebcfd32d96375a840df676a1150aba41f6ccbc3b3ffcfa42f4eec90ee67ae0eb21b93714e08b5468d5c752fa49be20b2ce49949f5c9d583e42be1b2c26d9a5d71d64d167e35f93270cba933539df7686f9856f1d6fcba4a3e1103bd0a69694f6e4e6c1dc26b5510f2a4f114687d1c3d047a285a0414529c1698110c2b3663f46d0e99c18b81820edba9739bbaf806e5011fd30bd95085956f299cfe85ba11d69abe646b0815396dfb45cb9716b108fdadd4c7cd4c2e14c434db556b4567ea4246d132acfe494288d1d982606a4f851b01f83703f0dd62712c727645a6d5c57b87fa00d27463297b6972f84e9aa5449a01efba57272050418e6670da92998d0b0eb6fa4de4e6c52b4ad8a678dfbdd7ccfdfcad1cc06cf6e7ee9ea142d6870a22d8450ce8a342a5c4b4f8448d33d10e205afe5c5342dafe8658f754060439d931ebf8d1afc8067eb3ef30998ac3d67d18d782cf2e7c25a8467e9c8cf33de3749f93f1334cc0a3c1798685399f51adb940abbe1cf5932e4f67df2881a2ac9e9058eae7a1035298e391e5c3f434bed9e8b5939df975a176c8ef4b1e6b6eebf1b6d82982d3591560404648de8d2432f12ade892b562ec5498808b2d285ae2410416d07c303ceddcb764ae26a64ad6aa31a90b675e96e8c38dbd365ec844c82361261ed7d29af85a4dd0acacad9c3d60a5e310984dfc661a59b025d775ffbddd2281749fe36ac8775763cbfbe43a5f26710f430a4c2ab87248ffe4c7306875a0a38842e4458cabffc9d09f7d75e7f028b7c8b8bc481f64cf2d70f472899b9ef6ba431b02d3716ae0a7e83d66debb515c749d56912ebb9a710bdb2bc9d5536f084bc9bd5d4c5a891f1cdf915d6069e53d987940c6fb4e74c9057f0b8632627f6ffac7b5c4f2f6b0e4864ccb44448263e9e99bd4d7421a6cd282cc7cdc786b69259275a8bd0b477bbaab939baf451cf0cd35a26608074ba55cfaa8e574c9b978d9c40891ce549189a2a5a7abda3f6ee1b404d45e7201d07d330579ce2f3769fd3cea787af503764f00e47b78cd9883f44992b1371b078f3000b3a3c3457c95f8df7d0e8ef6defe7eb9b039658190e76acd6cfc5fc11cb72ca9c39ab181529990ddca967d56351c0e4c9bd51d7ced360c6df153a7c654849a8226db98c6e1cf544d806f4758c970669767e30723f77346f2405a6117a745e46fe4bfcea57387e4e92c2489c6350c0906c3bf89b630624f4c851ba8872f1960598e9ac97c718dd255dfc6fd919486829e2651ce90ce059f9052ff769b8a272360cdecdc4185a5c5017c085b61f23f9ad3bec1c0857525a8d0f620eed5b0f209d63e127d637e78fa27162ee1793cd455e1749310380ebed3546ecec3739eadc36d99239933f46a38cbba9383d88236fa0b6c23d60d7382569bc743b15a8d5e8ebb8fd82d5e84864210b6154a655199e534041831ab18bfc50a8d65a04459cb5317393c668ddb73286fe43d7890fd0a93e40e71c158cb2843c287d6fddbed1de09c0ad134e6c1b65a6d93102a79604ddee853d38845631f30fa30900894552f8abf488cba7d23b4516874b4fa45816fbc3bd3afbbb3e0d3ae56f96f2fd6f0ed7f5206a787b91ea603f2d5c700ed14da182a292d173e6362b6891d988245b1f855af0e1bc3582b6dfc59d36d02490cf407cb480a53bafcd601399ed3998a1c8cb1a5afea8b95d8e52df49ab37d3b303a1126b5d070decd64b693a056f4ddc8b09e5b607f19429b8d2ece1b2393b6694e924aba6467deb5585322678e6ac6f2ef097cd8e8004f78dca7e9117001bca10918394f2a88727b745478b21d1d51b0f6f6e0ddea8dfa65919989131f34f5d5e36ef9bfe516a5fcbd282d4442b07a607a3d985edca1f8c1c9652e3a01cc01523c1ec417829ecd69b600ec1fcb2b3209904d928b161904db5bfead08bf86e793d3e93bf9ad0e4b658e82be64d47516fcae1880d684300e4d71b079ec77c664f3fe3a1a27232474f02a13f4457d8e5572ae5d3f06c1f4f90eb8af36f964f04cb61790bc93163ebbcc71603cb43485aa8ef063eb8b17b0c742e1c02e5e2899cf972592756538a0bbf82731b210423bac549193a0c07f4ce16c9fb996599ee888634a4fc4ac2f10e8483a1d80ce91be1ddd8dae5f3696a6ed837a59d02ac2ef5c058cc2c73e986e757421ad9e0a0046b2afabdf574bcd8e07eb769c6ba69497592606d86a73ed239bb839e50758d793d2a39850071c59180b0f3589e2c0c71a33b05a86a9bb34e9147b18652d71ec5c595fe0f8ad9d44e12254acc6b6016a307dccefc552abbdc231c4a0668c13a903e0b2e6ea2277603be9bf8dfd66fbdd647320909227f198dcfc369133374fea52b482d49a45eb5c0ae62b4a98a70470f7eea25197b1138f0758183eb2e0c602f9457b40d7d8484e9362701ddad5f1af7907194b2c369b46ca909af038ba9e8dff89bd1678981decf2bf62fb19077a10304f876dbcbcced8bdaf442229d72edce49981b9fa5ee070883c564494f1eed0dacb11e458f76a8a51a3c485b4f8a3c44d0be8b73272b2c92e465aa2154852883c76ecc1d29527bbab5b6ba1093dc29a715f0ac46138ea8d30be29e707002aeb8dfc2035e20b6b8437ce646357f0702b8d0c22bad75f92bb8462f12302769e73a9fe62781a48d825b75d97a82479d41fbce073c2d0a23c38b727c25d2a79ab479ed8c320dfaa078e0537a7e7bb42a9ab57c5ed5d29f10392909ec69cbf6e391beba4f1a098b2c88a29749c2b37b87230a3007ef0e323c72c94e3b317ebba9f4de98c19647bd0855799f9f0f2db3ea967c576b532cb03bbcc5518014a69243164f2f288f7319fbc4261e3e976f05f840865a2fee5acc27ec2d2cb68f458233c1e289ab012758d741e2c55adb6814826737a69bc75d0e40e1a51938485b312213c93e4317b2c98ab5285276e8c55258a8d3591077f619314739d17fb253863dbaa23d5aa5a890e68fa7578f84767d591e9086b8acf9519a21171bb48bd3382b35f889399e58215f80131f8839fc20c77e42559aa42d06515672da2d33313cb0d6b78e2e74b2d43905fd47061a76482503e1942711427fb032099156c31c97c09c3de07207407e525eda70cb72bc9305b95754a85ea4e35f6a9ad7d2063e23922a2ad6ff044438fe0895d588419a4ff64a22d9b730487f330c0405987ee59d71b0edae607485abc9b98c88ba93582b90e841974c6233d1dfbc6288d2d821df4cf7bf708f39596c052861aeb091ad41e253564a4da88eabedb08819c72878b73f7a07b94b4e9ac6b2ad9abeb84bc3f51a020c650faa9134a859e11e7228893d036badcbdfec43c2f6cd123e13925fc663fc043a58ea4b8697ff136cbbd8c3855a66cb51a50e3c6ffa3f4b43640fdb6d646006b714acc5734de26478b9a99e71495b45b111a7cd7f721c0c39844dd70d5667fcb83a7488417d1c11dfd5768a78f6ede3b3977541f93803beefd79c4223aa797d001c2f7d39aa1a94f982fbaa267a30494d8c39f32275bad07442645ddb758de832032c0e77fc898b120b6ae934f46037bf1bc52ae8f8136f8e8404230028372d3c84330395d4f2c368e2868a3bcd5fa290a155fd505a7253ac5b9653b8f25727c76f8d7b85eece669ce03f5d5746b0fc27d09565970157501718f4ec635dabd1630c77fec67377ff1ac36ede171b692124f482b49cf8ce781fb5d12e818d89c5ddba2ab86bbf23e9d8bd692483984685af4b704322c88ab46e4823fd55ec920d5719020c7d419f58739bbf410d713dae59cec77650387644db618f0bf71a2ca4563917c0fec6bbfd8bebe7c404c7f8a5576dd3057ed1247391645bf3e39797749c6090c6dc2a5f1f637bbac46d59a302a6ae6450dcb9bd2a2d337f1c6194cc85d3e1b9305478e8850da783911ea23d1c16a6c5f0377df9c0912c71a31e48e6045ec05e34eb1b01b4c64190abf3ac6627af33c4b165f4af638eebaf299fe524a45aef46395ccaf55a35b299b9e5d32d2e26cba3b6798e74a3eede8a7f4391699aa358191498a3056cf8860e926e243b5a31e78213c87ff000b9ae2b9a7f0f5d007d97285494596b575ae7e7a07b794d0a45170396bd8410d29a6a6aab06e6ee80c357ca2c30e350948b96c0eb2cdfe44b58a5a3c8cf2aec4e00cf6fa45b0f7da2adf4600c1eaa1984b703facc0f52c7e874327ceab7bbe8fa111e4bbe2800cc22fe41b9599d6de4813f7a37d15e4a62e929aa9cf0b11b65a27363571838dd605a175363d79ecf2e35e3d6c1e065ccda7da78baf38b2708512195b7e80f776aee5468b3f077d538fd9a617b6faa9fc2ca9abc402577ceec9e19c6283b4566d196633deb0fe5b709998e68a85c5a3c03e623084e278bf07ab69ac9a10653f63cb6f3152da1bb2f31996af49c7bf73b3c928a67882f20cbc1293f10cb90eba955167de74fb27e8cb4368f340285757cea1eda1c39488bf16ad07a2e14b90a2c2a11469d29289757beaadc2c9c7b1f1c7d3166168cd612d984367bd70833438d8b15757c0a47a3c4729f7117f9d86cfc430a29730b8fd04ed22294a88327c499918a5a2aefad899eb95b1a77a42cf467e967b7e7e94dc22282252d953779dcdf047ba022ba71a425063e93e22a45489767bba28eec9c410150409a762d2b90a826130a6bf4c9dff6e6e010df11f8358f01bf6532980ade891c7214df20b9a923170c90a3c9aee81cc0e3d6d4736f11df97fb004982f9da818aab6cc6596f76a60561243e9b546e1979ca901203b2f176c7fe205f7430199bcc3aac310fcd5f859b817e904bd7e1d1e60e8d591b8acab10bd009b9326511c982ec254a269c84c8c72fcdcf80ce143a460d2ba3cab2173dff0d7e00d990c17fa1fd98c4d391b435b52866e7a7d661433053bfdbc02e1586422e33ee9e46cfa3c47e3a53d1a0c862cc4ae49bf854d4660347d112238adf596936dbca635a86caace302c122549b6350f59c3389ad5cf72bcadf99a3ea47db23b906fb5e466352eae74a8add70f64071929be88eae86e2999cb0d923ed21bd27ae563239a0459d8587f2f49af479415231a480c732e1bcd22f6ab75d369d4f52a9a63a72d5bf9e76e81a0b46f6fce8e538713787fce5cc64e9e9d9e460cb444edfdade31267b766b9a5f48fb122a5b651b66d450ec065198669b27a1ba6d2250353ebeb6c2a6ce6fffd4b69560f19c476e0df5c9181d1a631154cda680d888aeea381cf60bbe8ef0e1d6cdaa1da854f3f222aba294c0f3190cf23440caccf1c8408fef17c8a1226c70638a6bacd76b9cbf1583a01dd383da54b23dd9461db381a7671de383453f367e76e5cc2eb70a6bafd305f3fbb2457588109e3c41711994b70b290a9b86e12ea6a2e7cde677d2f098361042020bd6f15cff44624a6d3a4a9a05a7775efd59052e453301e786b24781d845e0c33efef9a0ff96218f5c62a809188dcd8a5463e200c4a1313915a2cbf2cb60ac16fbc6dd0acb44508f8d64a487c75dd3c8fd360dff6016057508f257594bcea8111d62567b7a714130a12c1bca4effdf2e7522c4ac46bce04add842ee1d8086d9edf66b145d44726a740889848b890eea399a8c6d0d8ae3d1c27deead229d3706524385981f3d97f9b936f52145296dcbb308c2dc53e0101a050687346d0dbc6f8998730fac97e15365de33ba67948e8b1e6556fff9ed9d95e0ee4e34e77e7ebf8be8c4c62214097e36cb617e9b0ad95b57b54430d4ce330f0772642fb9eb2ff6bdeb734ee", 0x1000, 0x3}, {&(0x7f0000004080)='$', 0x1, 0x8}, {&(0x7f00000040c0)="2bb0d0e42aac39842e36fefc4cc400a1d64169bee141f0e8224c3ca0668eeae2fc6121ebbcf2ad58453da23a2a82802ec299688c7815385cd1ed2aa70f68e6ad2794a9b547cffff73f6f550c5aab97d2bdd98304", 0x54, 0xff}], 0x40000, &(0x7f0000004200)={[{@nouser_xattr}, {@auto_da_alloc}, {@nouser_xattr}, {@nouser_xattr}, {@commit={'commit', 0x3d, 0x5}}], [{@seclabel}, {@fsmagic={'fsmagic', 0x3d, 0xffffffff}}, {@audit}, {@smackfsdef}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000042c0)={0x0, 0x0, 0x401, 0x6c6a}) 01:10:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000004800000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030026001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:48 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x4, 0x0, 0x400001) 01:10:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010093000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000fdef0000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb0300fe001300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1671.314150][ T3527] loop1: detected capacity change from 0 to 140 01:10:48 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x6, 0x0, 0x400001) 01:10:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030004021300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1671.355080][ T3527] EXT4-fs (loop1): bad geometry: first data block 9633793 is beyond end of filesystem (64) 01:10:48 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r3, 0xffffffffffffffff, 0x2) fgetxattr(r3, 0x0, 0x0, 0x0) fallocate(r3, 0x42, 0xffffffffffffffff, 0x314) fallocate(r0, 0x0, 0x0, 0x1000000) 01:10:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000effd0000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1671.444142][ T3527] loop1: detected capacity change from 0 to 140 [ 1671.458829][ T3527] EXT4-fs (loop1): bad geometry: first data block 9633793 is beyond end of filesystem (64) 01:10:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000031300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:48 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x12, 0x0, 0x400001) 01:10:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b000000050000000100ac000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000fffe0000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:48 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = fsmount(0xffffffffffffffff, 0x1, 0x0) ftruncate(r1, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x6b, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1000000) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) write$evdev(r2, &(0x7f0000000240)=[{{0x77359400}, 0x1, 0x9, 0x10000}, {{r3, r4/1000+10000}, 0x4, 0xfffe, 0x80}, {{0x77359400}, 0x16, 0x97, 0x1000}], 0x48) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000100)=0x7) dup(r0) 01:10:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030002041300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000feff0000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1671.614530][ T3577] loop1: detected capacity change from 0 to 140 [ 1671.650403][ T3577] EXT4-fs (loop1): bad geometry: first data block 11272193 is beyond end of filesystem (64) 01:10:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030006041300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:48 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x1c, 0x0, 0x400001) [ 1671.722960][ T3577] loop1: detected capacity change from 0 to 140 [ 1671.729927][ T3577] EXT4-fs (loop1): bad geometry: first data block 11272193 is beyond end of filesystem (64) 01:10:48 executing program 4: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r0, 0xffffffffffffffff, 0x2) fgetxattr(r0, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x6) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) mq_timedreceive(r2, &(0x7f00000002c0)=""/14, 0xe, 0xffff, &(0x7f0000000300)={0x77359400}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r2) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(r1, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x7c, r3, 0x20, 0x70bd29, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x2, 0x6b}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x5f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x32}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7d}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x59}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x1d}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3b}]}, 0x7c}, 0x1, 0x0, 0x0, 0x50}, 0x8800) sendmsg$NL80211_CMD_SET_COALESCE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x60, r3, 0x8, 0x70bd28, 0x25dfdbff, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_COALESCE_RULE_DELAY={0x8, 0x1, 0xffffff7f}, @NL80211_ATTR_COALESCE_RULE_CONDITION={0x8, 0x2, 0x1}, @NL80211_ATTR_COALESCE_RULE_PKT_PATTERN={0x34, 0x3, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x7f}}, {0x24, 0x0, 0x0, 0x1, @NL80211_PKTPAT_PATTERN={0x1e, 0x2, "d7a0bb7981c3d5c88968988dd641215c2f89213da0057d44299b"}}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x404c001}, 0x8800) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) r5 = clone3(&(0x7f0000000400)={0x200, &(0x7f0000000100), &(0x7f0000000240), &(0x7f0000000280), {0x2c}, &(0x7f00000002c0)=""/74, 0x4a, &(0x7f0000000340)=""/84, &(0x7f00000003c0)=[0x0], 0x1}, 0x58) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000500)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x24, r3, 0x8, 0x70bd28, 0x25dfdbfe, {{}, {@void, @val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_PID={0x8, 0x52, r5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000005}, 0x20008804) r6 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r7 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r7, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r6, 0x0, 0x0, 0x400001) fallocate(r6, 0x0, 0x0, 0x1000000) 01:10:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000c0180100000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030080041300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b000000050000000100ad000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:48 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x104, 0x0, 0x400001) 01:10:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000800000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000051300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1671.896395][ T3620] loop1: detected capacity change from 0 to 140 01:10:48 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) write$evdev(r1, &(0x7f0000000040)=[{{0x0, 0xea60}, 0x15, 0x8, 0x8}, {{0x0, 0xea60}, 0x3, 0x5, 0x5}], 0x30) fallocate(r0, 0x0, 0x0, 0x1000000) 01:10:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000040000800000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb0300a5051300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1671.939155][ T3620] EXT4-fs (loop1): bad geometry: first data block 11337729 is beyond end of filesystem (64) 01:10:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000061300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000002000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:48 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) ioctl$EVIOCREVOKE(r2, 0x40044591, &(0x7f0000000040)=0x7) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1000000) 01:10:48 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x600, 0x0, 0x400001) [ 1672.037330][ T3620] loop1: detected capacity change from 0 to 140 [ 1672.067281][ T3620] EXT4-fs (loop1): bad geometry: first data block 11337729 is beyond end of filesystem (64) 01:10:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030004061300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b000000050000000100e4000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000004000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:49 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x8, 0x20, "ed005400000000003ec13e20000000eb0000000000000000f2ff000000000040"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1000000) 01:10:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000071300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1672.225842][ T3673] loop1: detected capacity change from 0 to 140 01:10:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb0300000a1300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000007ffff000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:49 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x1200, 0x0, 0x400001) [ 1672.274572][ T3673] EXT4-fs (loop1): bad geometry: first data block 14942209 is beyond end of filesystem (64) 01:10:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb0300000b1300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000001000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1672.352668][ T3673] loop1: detected capacity change from 0 to 140 [ 1672.364493][ T3673] EXT4-fs (loop1): bad geometry: first data block 14942209 is beyond end of filesystem (64) 01:10:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b000000050000000100fe000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000002000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000181300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:49 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x1c00, 0x0, 0x400001) [ 1672.480910][ T3712] loop1: detected capacity change from 0 to 140 [ 1672.519218][ T3712] EXT4-fs (loop1): bad geometry: first data block 16646145 is beyond end of filesystem (64) 01:10:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000402000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb0300001c1300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1672.592991][ T3712] loop1: detected capacity change from 0 to 140 [ 1672.607541][ T3712] EXT4-fs (loop1): bad geometry: first data block 16646145 is beyond end of filesystem (64) 01:10:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000201300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000003000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:49 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x3f00, 0x0, 0x400001) 01:10:49 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x40, 0x0) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb8, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001640)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r4, 0x50009418, &(0x7f0000000400)={{}, r6, 0x14, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16=r7]}, @devid}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002040)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r9, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r8, @ANYRES32=r7, @ANYRESOCT, @ANYRES32=r5, @ANYRES32, @ANYRES64, @ANYRESHEX=r3], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000280)={0x0, 0x7, 0x3, 0x1}) ioctl$BTRFS_IOC_DEV_REPLACE(r2, 0xca289435, &(0x7f0000000680)={0x0, 0xffffffff80000000, @start={0x0, 0x0, "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", "92b02c90bc888e5ee2cfbbe40e18da5cd7568a522ec6ae1037a1d6a5439e31abb9c870463e39c5c113b47112a186a2cb716b02963c7221663f831f21ee65e785b86c4e14ab4607aa2d69c54f5547d62f340239ccbda5de4c61fef3a7f87bd54eb438a0ce334f79cd6d888c63751c09b775951d0b45e8bf145e68a7d6d4d046dfe81a9ca86b791558de87332468a1e1a059cc114b3af3d0b3c62e63f43edbede6b0737e53660d648e16bfac2eda03cb183614bd8780234938a2fda186eff7d12f8aba562b1e29bfae2ac8bd6633f0461492b5ce098941a0065f608b860a553984cb8c6cee04ec6cb5cf13bf96c414473d925820dff96d346bd5d72b7cf06bf40aa3f6bc95833fd4b2f5222ad83f8083068cf50daed2571138dad678ea335975de9c2d36c2f44670596382952b8038fca7448fef5ce18a9d2743af9d8e9db4cd73919b25b92bbf159bcd7651283b88e4594bc85b92e179f52c627186895c08eed474c67f7a32c7548d8b5dd5102c2bfcee4a26e0806fec1273d6dab7c74a41e1553a3d249cfd482224a991d7a59bb1fd8532db06a7067f57dc1eadcee873ef77f712187d17d958881634bc37962f728e43c25ac5f58a20e4e14cd3eb62cba9b38de8ec2f045a8edccef850cea9b020ff6c1d36d34eb1a424f556ff37cbbb9d7af33e3697859f26eb68ba02aef483b0cebfd53ccc3dca8fb604c350536a487b10563c1b585a13f73f3839f5bceb6658ce624eeeac19ad1cf536d32d818e687ab6244267185298c400b5480f3dfea17451a32670632773458c01ce2de4f5809ebd351719f6fee9afc4d8bd8d0c7044d7a456f94ab130d80d305a2ca4d12fe4eb5077097759181a6fd7d8fc1d5695a23665c52afe19ae41e0d88c2e610319ae5dd6b5b7ba6c1eb935ad252747ec594eec0d52c03cd3610e1eae62a8c8b3c50a8337b5f181efb2ee0e298445e4fd2430491eabfa4ce53abdb8a5e91527642f1204c1427b6229f94504ee526ad837617fd560292306f774ec1aa33a36a027a279f600e787bade3fc7c6fc027d8923a06c9d3ed4c05082d2796fdab2971df7edcf70967e325490324a2f1dcdc3707e2e6e1494466af9a3d87d5d30e236db7bace33887581ca519cb426dcb1ffe9194b47eae8e48d91170a19439cb6015d4954753daf81d2f935e6813e0fa5c148dc4a909c8db4f8e37f9ef6c1d1a9ab0e909fcdb38e2474cb5e0356facbf257d577c11af67f1dc6c17252b702ba8b2af740889ee171501f361c10ef4b13a3b0fc38d8451aa041b45a7174da8565df0d5c5d6890d1c609eeee6f6fe2124b97cd8faf0ef4eefdc827e4d13d12be33b8cf6cc6e592c1e1d937279c7170211453047eb37915b0ef30b695be398e55777c42c22a082a3602b9a6647a3f4bd0f3f4ccc0d45c254767b33c28e62e5be1ea21baf4c72978fe49451ec"}, [0x5, 0x4000000000, 0x1, 0xa4d, 0xca, 0x80000000000, 0x57c2, 0x20, 0x40, 0x8, 0x8000, 0xcb, 0xe5, 0x8, 0x6, 0xcf, 0x200, 0xffffffffffffffff, 0x8001, 0x420d, 0xce, 0x1, 0x4, 0x7, 0x10000, 0x4, 0x4, 0x9, 0x400, 0x6b78, 0x3, 0x3, 0x1, 0x100000000, 0x1, 0x9, 0x3, 0xfffffffffffffff9, 0x5e, 0x10000, 0x128, 0x6, 0xfffffffffffffffd, 0x7, 0x2, 0x0, 0x5, 0x2, 0x0, 0x1, 0x1ff, 0x9, 0xffff, 0x101, 0xfff, 0x4, 0x80, 0x6, 0x3, 0x2, 0x3, 0xfffffffffffffffe, 0x3, 0x5]}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000010c0)={0x1c, 0x2, {0x100, @usage=0x8, r8, 0x4, 0x81, 0x0, 0xfffffffffffff622, 0x200, 0x9, @usage=0x100000001, 0x0, 0x9, [0xffffffff, 0x6, 0x9, 0x0, 0xfffffffffffffff8, 0x6]}, {0x5, @struct={0x9, 0x3}, r10, 0x6, 0x4, 0x3, 0x32ff4000000, 0x1, 0x400, @struct={0x3, 0x8000}, 0xffff, 0x9, [0x1, 0x7, 0xfffffffffffffff8, 0x9, 0x0, 0x9f]}, {0x1f, @struct={0x7fff, 0x8d4e4999}, r11, 0x6, 0x3, 0x3, 0x10001, 0x3, 0x401, @struct={0x5, 0xfffffffa}, 0x40, 0x8, [0xb8c9, 0x5, 0x3, 0x80000000, 0x81fa0000000, 0x3]}, {0x9f, 0x101, 0x5}}) r12 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f00000000c0)={0x0, r12, 0x9, 0x0, 0x3, 0x20}) fallocate(r0, 0x0, 0x0, 0x1000000) 01:10:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010004020000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000261300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000004000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1672.738712][ T3755] loop1: detected capacity change from 0 to 140 01:10:49 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x1040000, 0x0, 0x400001) [ 1672.782104][ T3755] EXT4-fs (loop1): bad geometry: first data block 33816577 is beyond end of filesystem (64) 01:10:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000005000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb0300003f1300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000401300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000006000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1672.894476][ T3755] loop1: detected capacity change from 0 to 140 [ 1672.916146][ T3755] EXT4-fs (loop1): bad geometry: first data block 33816577 is beyond end of filesystem (64) 01:10:49 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x2000000, 0x0, 0x400001) 01:10:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030004801300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000406000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:49 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19QHP\xf4O\xe2\x9f\xea\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x2) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000240)="f34d0952dd2222f32b845364e2a2890acf4fa2d3ce38cad5cce74ae1066f2240220eaabac8846c352e7499b46e069cc1fe41020765ea7b36590033876e6559d41d2c098a9f9bd8e69605ad9fe25ab4b34bd2b10c261ecbfa5758616f0e1bfb739e008db9c352edd93488182c1ed965ad81e0baa0865c6e1207b1a007578012f73de779c56c06824a697f385601766d89c2", 0x91}], 0x1, 0x1) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000000c0)={0x0, 0x7, 0x9}) fallocate(r0, 0x0, 0x0, 0x1000000) 01:10:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000030000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030005a51300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000007000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:50 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x4000000, 0x0, 0x400001) [ 1673.119469][ T3812] loop1: detected capacity change from 0 to 140 [ 1673.156159][ T3812] EXT4-fs (loop1): bad geometry: first data block 50331649 is beyond end of filesystem (64) 01:10:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000008000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb0300fffe1300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb0300feff1300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:50 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x6000000, 0x0, 0x400001) [ 1673.236086][ T3812] loop1: detected capacity change from 0 to 140 [ 1673.260738][ T3812] EXT4-fs (loop1): bad geometry: first data block 50331649 is beyond end of filesystem (64) 01:10:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000000000000a000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000021300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010002040000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) [ 1673.418132][ T3855] loop1: detected capacity change from 0 to 140 [ 1673.433946][ T3855] EXT4-fs (loop1): bad geometry: first data block 67239937 is beyond end of filesystem (64) [ 1673.485368][ T3855] loop1: detected capacity change from 0 to 140 [ 1673.503149][ T3855] EXT4-fs (loop1): bad geometry: first data block 67239937 is beyond end of filesystem (64) 01:10:50 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x80000000003, 0x151843) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1000000) 01:10:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000000000000b000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000031300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:50 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x12000000, 0x0, 0x400001) 01:10:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010006040000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000041300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:50 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x1000000) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFCONF(r4, 0x8912, &(0x7f0000000100)=@req={0x28, &(0x7f00000000c0)={'veth0\x00', @ifru_addrs=@xdp={0x2c, 0x0, 0x0}}}) r6 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r6, 0xffffffffffffffff, 0x2) fgetxattr(r6, 0x0, 0x0, 0x0) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003fc0)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000003f40)='./file0\x00', &(0x7f0000003f80), 0x800020, &(0x7f0000004000)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r7}, 0x2c, {[{@uname={'uname', 0x3d, '/dev/input/event#\x00'}}, {@access_client}, {@cache_loose}], [{@context={'context', 0x3d, 'unconfined_u'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@smackfsroot={'smackfsroot', 0x3d, '($'}}, {@fowner_gt={'fowner>', 0xee00}}, {@obj_role={'obj_role', 0x3d, 'syztnl2\x00'}}, {@measure}, {@obj_user={'obj_user', 0x3d, '\x00'}}, {@obj_type={'obj_type', 0x3d, '/dev/input/event#\x00'}}, {@permit_directio}, {@fowner_gt={'fowner>', 0xee00}}]}}) setsockopt$inet6_udp_int(r6, 0x11, 0x66, &(0x7f0000003f00)=0xfff, 0x4) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000004c0)={'sit0\x00', &(0x7f0000000440)={'syztnl2\x00', r5, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @loopback}}) sendmmsg(r2, &(0x7f0000003dc0)=[{{&(0x7f00000000c0)=@ll={0x11, 0x6, r5, 0x1, 0x3, 0x6, @random="8816f41b1adf"}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000040)="aca415330b60d73513cb70c98c835222e51c1ab4ee9627488671b8a34eece2401c6522a99437e551", 0x28}, {&(0x7f0000000240)="527e65f3bf78827e60c07fc53f9c9892b0562d36f1d7ef77ea6c11f27877bf62c8a705e198b622a6d316a804113c89925aba71d0bf3846adb79462094ae410a14436d4018642c0828588b4d13f27329c47e5331dcb4616d946d3332126af27de03aa3e99873a31e7d23ddc159c7934636f5f6a0e6111411e2d9e9b35b4de58fcf0d30299b0aad903b1c4613720613615710f1dd7fb60716a51a1163c3f44a1a95cb3b65d664ba3c9975e", 0xaa}, {&(0x7f0000000300)="4ccd3ca5ea49df41b9a16df4dc96ec04ac644f0b750d3952cbae7831983b9cc1b15673b2663866a5", 0x28}, {&(0x7f0000000340)="c9cf6361e48be50c662f5c2688ea0d6902fd57968561e4a4f11208bae4da98a725ea16ca6d7f1788fc69478f1a6850f917159004b2f4a42815312f7c85abfbd4d52a0c4a1c852a3291a61f4f650a49057a81c2eabc176823ba9090675803873d7a142e7b", 0x64}, {&(0x7f00000003c0)="9272ff5f4f9e0c44f12adabde750f3ee82acb9c112eac7191654df00f655fd0d98be3b626ad4adb551cd3b1d664677e894b8c7b200c251722b34418129ca67004337a38c08c74769f9a96c47a31aae469558cc0557e53af605fa80ee4f5cce06a89133597a9e3a711b586f37f011c2ea767029d009f762", 0x77}, {&(0x7f0000000440)='i', 0x1}, {&(0x7f0000000480)="80f1713f9cff41f9b750079bc6b8ff7d8dc94fa5e8bd7d5ca55343a1b0f4df1f242bcc4aa40af564b90b6bdd599dd098d229a255a168b149d92f225ead8c5aae9d9ed1f094818cd8024af92ed3589d54acfc924d37461220d394529143545d3c6cc2b6a74c61ae034776d85ceb1e2764fb65766c48c147fb0a1f7c11db58", 0x7e}, {&(0x7f0000000500)="8731b03ee3b24c741d3c2c113b7702c4ce1be15ee2a06b042fee8562bf0e8a529e410012ac818a6d467ad7d3a44093ed8fbeefec725342c3259fbede2d95dd05dab13cbea84ab7e4f84542dc46926653fa5afda8734b410ef4208e0c7691872b4f8acb2dcd8b9aa6bc7c8eaf522e778e6b4e8dc45024c1b514b7ef8b905ea038a1ee20afc35743", 0x87}], 0x8, &(0x7f0000000640)=[{0x48, 0x1f1, 0x80000001, "fc6cded58ab922a7816e2836a9040703e81440553a9cdc677c0556d6235c0df396dc153a7c85560bffcefdeca3c6819c6fb5a77cda43"}], 0x48}}, {{&(0x7f00000006c0)=@nfc={0x27, 0x0, 0x1}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000740)="4cc5eacddf150f93e0751de0b3065f73ab40a8bf4c03b34908cca5c96f4a320874227a6972dd59e22c7944b8f8c78de51b432642dba9f6194cca8528edfd08bbfd4704156771022e7bb373308e322c85421ba4e41dc1c5be1f20640e3bd75e8bc9a02080c8e9ac46289542cc26004e3f227259705799a7dde66c5a5df7115886ff1ffa4bf3c68575adfb448d3fb852b4bc115b8ea5a72b84262989ef2e25d27606e1f30cf2d6d689cd5ab5d3af85a9b6557e7c050748bfedf51b035db372a8bc357eeaeed9171b256be28527fe67", 0xce}, {&(0x7f0000000840)="a385f65244e247fdcbcf35e21b40c7f17ccc45e4a79f00b0edaf2615f7316433a4303b0fed3698ed1adfbb7c6d7a96810b058ec43dea1308a1efc5d7", 0x3c}, {&(0x7f0000000880)="12ed76deadfe3a3a602a1927d617c06bdf899a4590e5d5ddec5e6d0d7ab824622bd2cf07c4207bf7b31d0dc645d1cad8df", 0x31}, {&(0x7f00000008c0)="e02f55f3ac9a02cb3b0ed09c0d8f8a5873a3dec5e52300d4de9179a25d9e07c30c82bd2b348b69255637e27d08da7c7878c6713478d8d3257f72746c7b4f8495e8595e75f9c8cb3dfd631687758481ba5a7d1923b7ae0ef10eca26992e93e400cf3995ba421516fb4370e8f816c4bf20a1d0dcb03a09195e1e676aa2fb975a", 0x7f}, {&(0x7f0000000940)="9cb947f3c477a9f5809dddc38b617f60426ab0370f53b2990d659bca52d824c9d24d958b90205aa3d0547fe1085ca384df40eed19c727d59207b9eb882af92fca01af9bec4891cd0a84f14284102fba31274cc2a4871330004e83619f15ef3ee5374d73c92962d2cede4c7ed7c", 0x6d}, {&(0x7f00000009c0)="20526342696cdc78a5c729ac6e3ebc6b9d553a6f5781898b4b3a17b50ed6db2ae851fab4f4736519dd1c62f85c696e8237bf3a0203b3da3e0425e3055e54c6bfcbc6f7da55d9708840569f8243ee56d1a99dadbc91cced0d5790afa2915f3edf73ab407ef1b93a061e13ce799ae92c5dab94d72ade9c233a4f68b4d27702c194f7b4dba62452d3a1fcb1983645880a4d1604457dd63f5e6ca78c155508b25b3f4a8325a250bb", 0xa6}, {&(0x7f0000000a80)="80bdd70f7e2704d6f066f5c44f0b054dc976f758f8804f4df9771f7bbe462c1ad73572edfa33790dad9aa4a44cf7270f75f91abe89f751e99636fd1b78fcc58cdeceff161a1916c87d56515247d8dc1e408bbc1043a3d5355140a77275b16ef4df60933260d7c0a6d03f12697f630edcd96b59e77e2cf2048a701a2a", 0x7c}, {&(0x7f0000000b00)="22cd45", 0x3}], 0x8, &(0x7f0000000bc0)=[{0x100, 0x101, 0xb1, "0ad9d70967a8bd97ea542adacb9ba9e4ae7d4bef399c9db72464e8d09194ea6b286f89080fd1c95dbabb83d79eb8e536dac621728f93d21f45424a2cc80aa32ca258d20d8d0b2391b7d7febd2e9dddad07bc9583847fbf2b4044cc7a89b61f048c14afbe4f7b828edc19a356b1d3d822db99eaf00cbab5434bf1df4e1e9f88f1053f926afb41288d9e74e6d319329f7b5d5bf727311509900f8d1bbf2f2e24309bf5938fcb0f2948b7b302c3b461c90b0c54dc56f6940a318afa74c46d7c626aa15960967b5b8179b466a505e0e641ba0add94340c7523caddd0c8cc1982c273c069f0d5e5b70194a2dc84e6d8838a"}], 0x100}}, {{&(0x7f0000000cc0)=@pptp={0x18, 0x2, {0x2, @broadcast}}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000d40)="1e3f77263a0a1b3a5badcc458c8109fb37caf8bb1d95d47cea5807b97f70d12bad6d955aee00fa8ed1c448365b141797ad4673ac2704cc123c0c63eaf3fcece99cfd9c77e5ccd439b5af46a5270525fec2408fc4ca5e94bb8bd9fb33c2c1b366105c435045b605951e3c03ca0cbf87d002058ff9182f4b6ee69063096488c56df829cf7f65f5c2", 0x87}, {&(0x7f0000000e00)="553db2576b9f28bec8a7d5ffb77d110a0d689b544dd55db9bc28", 0x1a}, {&(0x7f0000000e40)="33e0ee612be0bd67e17e9ddde2146fc58ef2612f5beede6014063896411730d3dbb5fec5e9fd1f41b1d7889b514be76e79b5b10b2db0b7", 0x37}, {&(0x7f0000000e80)="14845a6f9aea588f0ef83359f8e5ae64244ef3659b3847287c0ee7f98495507700cb646343fa63ada00c317522360ca1385640a4905c6e813489ea86173d193fdba02d0c5d3c46f29cc6fb99e004038c852d3b2b2e12630d34d32410c76dff16da387736971ef7e62b1085b8381930bdb0c3da69d7b74e05f754909532dffc0829e84c5cb4b2be965774a417713efe564af8e1086a1bed65afd0ee35352e11d812d75956d3ebce458548493f3e4ee6e087bca19faa370c697324f86a54b03dacb5c9eb388dd7b63b40a7eb16a310e359e2387c540a2a", 0xd6}, {&(0x7f0000000f80)="a480306dd1169fce195f70f18968e4a434087eca774b0412f24b846322b329d49d4edb025ed31bd3c9c3dfea5c554ccee3aaa80e12a88b07298deb7e280517bf3d1d63f5ed793e2f34783b1c4f3b0adcded7f205d871a66d94d695ed3d6f281b1d6e9b177c97a21c93d7", 0x6a}], 0x5}}, {{&(0x7f0000001080)=@isdn={0x22, 0x40, 0x81, 0x3, 0xaf}, 0x80, &(0x7f0000001740)=[{&(0x7f0000001100)="cd0a974ae5b85d9ea1b5757990a745757fccc23e8ac364bdaec0386f34d7fde5841213fcd13de0119e2d17c700e506e130319d179e10f415e89cec6beba4e7e102f8ecb2ade62c024dcddc574bbeff5d23e527dba86f3c462c27ebe47dffa26e73e3edbcaf184cfe8f53727d3c799449cc49638f367369acc909203f9d327d325aa04840b134b140b73dd41c2fc7328fbc5f6ff948ad999043376f74d4925741479fcdcd7f1250a646a28692e37a9ec397686e5f5a377ffef6e370614730f37322b208f379ea1edacbd66c161b1149e7", 0xd0}, {&(0x7f0000001200)="9c3937ccb5531adeaa3caeac0768c8f36dee041a8edcc8541f3d6edfbf27d2acb27f8fcb8256f3cce6d2a6bf5ee242be140b3e77805508ae1a2665a2cb0914331358", 0x42}, {&(0x7f0000001280)="34f12c7545f40b886fe37a624abb3987f3ba6170c6747b8e41f3944786bcc3f84fb86cf2672ef1631e762339dd99a9d51aeb29729927cf15f466062186d2f6f46f4ce3b790c3f5977b1acb53ec2e27755f5ce49ca757687925c1e9e41040ae7edd8c5c9c6689d548fc8bdfba03db8bdaeac85f6a377e3ae84e4806f710a06ae76fc815e6f3881d057a8ba5f44292edd7de2a17f73175310279530840f2777ca456834e3c5ccfb22c9a4da3ae06454d220ed93d529ac385fe9d25607398fa1a8bace1763a2f7a823a706a8fe7d141b5962c9f1ef19c88330f291cf2c80b3de01ded", 0xe1}, {&(0x7f0000001380)="e8014dca1b7d1e7b962a37d995ff7fd41060913e86e75a7d5128a26c6ece46dd4e9fa0be1a451e", 0x27}, {&(0x7f00000013c0)="bfb7baa598990a1c8af9c6df0b9580b85650038b5d7e049d2dd4854267f662516154ee2106b8422a26db9224892e58", 0x2f}, {&(0x7f0000001400)="1e10c4", 0x3}, {&(0x7f0000001440)="f89c208bb0ebdae37198a9e5c6745ed63874643e58551650ecd53598cc1873a53ded8b39beba22f1514cacf4535c816c6b067999a27dcaf8f17477d7344b0f1f603de03bfab3de3da2b7b54c1f61a5f2e540eaa1664e647ed819fec90e94f6d3e4a5e66610b8593e760cf8c8018bb5f0187e75fddcda226ff1172b2f19da8418f6df9ee56512a74a3ad2c880fda50162093e9ae063d8946ad1f9ce9b13f283f4c97aaff7e971da5be326bf7442c7a187c4e43289dc78b215292ebd0561c60404d3b3f08fdbd3676f", 0xc8}, {&(0x7f0000001540)="dae462ef9786a2695de15847bee513d19850d448b723f3c1b94dfa9a9a47331958aa9bede35c55a732f5e7852ed3b848ba07d95e0289091e5038946dd0e75e0ccc2aeb", 0x43}, {&(0x7f00000015c0)="02b1539f09b88cc5a58ad55b0c69695fa857dea1a21150d7e0909708928dee347ee120804477e5eaa10518e6ba8a73d0897c9dd3801774cd0c60a149ce73de3454a3e65d8186d53112049803b0259a89615bb6f5527d8bf33875e365b6ec5f4d0a67cf4b21f807bd5498546568148b39140a55b8e0b6ad4adce08b995159bf004427a4dd76b21132aa9ade67f12e1f6784c940d5", 0x94}, {&(0x7f0000001680)="41b023e5934568b5f742ceb837dbe957003aaa0db09f9754b35f32d538e2be00373708fb57fb8a890370d9510374cd82faaf4fb91414dc71d2f70cf944b29afd5411b2f08aed5c7bc64d0fb48159377ab734e3fd7f929c3bad78d2c5ae8b11bd0868b7c78e1839f0410ff078cd89bd0f3c562c53aa788aa110af47d062923978447f", 0x82}], 0xa, &(0x7f0000001800)=[{0x78, 0x11, 0xfffffff9, "a1db6bed150c2fbac3b9c14816e395d83ad9c20cd129e5b14f62ad06cb2ce62077ec1c243cf8976b7b54e054d23765f76ddaf8ca0d61865d0eeea0b30c0ca3696128d042fcd95b294dd943258a6d134a546949ebb0e6d57f91b3aeacd382d8a722c2b314d6a970"}, {0x1010, 0x3a, 0x9, "e7f6ba400ce4145f5225308e3924429c407a317a8a194c5adda9de70901a6063f802ac98668fafd3295d0eaf5a52af17626721d6db138069a1563f63aabe0854c3304d5f1677e6b06cd76fd1d91c6cf623adc6e30ee226f57644f9265cb41aa076a926c5211a601fdf02ae3e60a03aebc56d188e931d0da4319fcc4c35f9c17d803011b599101043790c2828aa501e8c16189bf6b71d4ce624ded55d0dbba39aba33158802f08c106aecb6309c1268918294cae5302c6eba6db2e59b38fcce7f84b946103d4a2b6e2ca8805e8bc42a9cf7b053d676cbe50566cc41561d5c7b4af1bfd9d489c88fa82ef9c3690253fdeb598230a53b59a6080e50822debf7a6b38263fde34a87a50ea0c8dda3de90e568cd80f96a65a66d76ba091b830cc5177b1223e0e767e96656c1adf4006898d7b4fc4c6814acf1c8c4dd7f15ee65089d8cf8ee01732f9b14c5904633b615bcf0b2efa2973e8e35de6a79adad153b5b5e1c1909400c4cc3d968c42e7cd510b4b5544a8459c55c76cec052b53a91fd60d772f3c0c513181d207d7d82a2401ab7f470cc3a4526920be208507251dbc3a7a5303e06a3885332e499f6d9602e948773d87eb8b3a8243d9e05e3309a4141591ad1484923e21f206d7eabe67f6f59483924abd763be9ade5adab5fc0a12980408aae71920baff6a2d0a8dc93f62b284fd56b5dfd5e503448b49697610a7feda8dd7ad6653598beda908b6141bae130c6f92cfa7a0f67bb602faeff59a1408d5fec060988d5bf0c3b55c166e1527267627404b541fb94391363f99e6386213b2ec41fde7fd4eea2c827b738a5398c70d2a5f3f0cc4aae3e997f545b29fef6a6b86d8a8a9e2a322a3953190aa3ce73a7ef89e964b84ca25981eb711a39e0def7018ad57f61dbf550c49f71d606595e3ac783ada1597a0279986c1d4bde54dff220cb7a0199a5b9d79bb4fe0bf442af82f9ec8de05eab16a79285adeefffbde3af28e981a57ed5c2855d7e07926ffbe27c45e03f60d7b6ff2cc59f1d7733b5681ac5b955bd8cfdcfab22d4e7de25b563b6901ec38210d8d74b5152e963274d1e561fb78aca68d8d69054f6351fa7acba676b106b774b8486f9a817bb9cb054aae28bf34b15b7dd40a6242fa26f5326d93372f571b46f0426d5c91b2857c53283a2c018ff2428a981d23a64395d503ab5119d46c32d8d39a8903491cbf5b73f8f6dc1adc33df00f3189f838bd23567e804fd35358a213484a90194f3bac2d48ac51f90ac27733ecb48befe06505a306a5c72514fabf0bcab01dd12777324fcb9e80387028db88c63c3b5f16080773fb0aefd4fb59385828917ce335fc8dd57f86564bb8d11e11367543e1ec885ac40f729803726eda6bdb4b9045b03342236c5cbaef38a10474f0d31faa4222c0b74d6c5c8b92f39ae41f08b2b3724738b9e85d08e7cf25660a630abce5472b4a92bbd5912e9e703e738d1674953827d061e805d438b45a8e596aa4f47753fd3b0b099ce30637caafd451bc9b81da2cad82ec2ae2de590f916e6e6e54e057e568ba77b781f975f8d50a2ced0d1ca3db49054e1543e94aac178718265198eba6e7a4cb4bfe00905463336bc53483e72d57385f547e1033ece5fd040bffec30be50d354bfd391455ee230767deacb89c79d67b7b9920922fcf70ef5f6339945b1caca17d8c8e0787ded856cb0d430a5c9a8f7dd6690c87da53cdb7acb26ae74df38740ffe7ef5e20356e936cf93fbf38f2768b4808a465b698b9ac0e79588621099d80719d4f4c94e38a59c8a5ae17e00070eb66f79142cac8ef68198c40294328b62b217fbd1c5d4101874dd3317c4372b08766bfd7baf43ee13351274f29dca96cb43654bb5771532455996699395ca30f07423629d5bf457aca4fdde6f68b85162e5a2ba01a1db206945bac0a6c9ba0cb5d9cdd739844060ade1bd420452c382f6bfb5815354c2f79b0e11cf695487563b4eadd7f14ba60b407412e9632657817d1192c67481e75be923d9d51b1488838357f77fec916a878bb249b84f05e617d81dc856d8cc508931b7862bc5653a680959859975a3b66efdb7f6a80ceec82026772d3ae4201fb885250be576e9200d812161f889b85a37429ec2be7360f9332d0d7ca59f401b75554bddb9bcff956064768852451da4d6ffe1d8e971ea85730318a644756d6404b687fe7cf9fe21080be90963b3a3e4e6468db8bf20a01ffc3b7a0f6f70e98aaec95fc6582426e0ee0227fd5483567c8922197940acb556827e5dd1aef491f6d877b556b150b6a17239bfee8a892608e6837402a007d2144dc88a6afc76a9c2b4edc355537a2b22256bfc94ee35ade31c6240028922668f935fd832b30ebcfb7b5dfc0f93c390d3da6da8f3711f831355ca5878b92c007d42fb3bd8f0f5e56774b379c0665c2b4eec65ed60b2a185e4d7a258091e166b4cdf335558852aca06e9d9c2eb79903a46007f7af53e6dd0061cbc9125f715343af46140f5f33de89b8aaec0898e473afd61eae6a085c89b382a6a4b7f77fe6dca60773d3f68cac30b2a43afb5098e3a927c516aa96ec11aaa3f7f82adacf1d93796170967fe46b7f9ce1d1520b3b2afc787b1bb0456cad975256fb1f44ebb34bfb8f61cfcf21ed28f2126ac735bbfadbd6438edd6e5daa11fec5a0f7958458342042451bbc04f5e36205b61a719643ffd1cc43388e6abb997d6e9003848f045c1ee68d14749664adf2875f9aa951eec977f08833acf0f0314a71f5adb7efc7ce136c01062f412fba37c9b84181e83e70d331bc91211743645145670bbc4b81fad44ab1b6eb406637d7fe6b42772739ec2882de02c49d1d1d5475decab4fa0e7bcc411124069bf552cef409666400c9db8bd4b58c0e285a76f273df778d8932e51d57eb33d785218256ae1f07644dc39d6d4b9fcd7b50c813108e13958c2f7575ab8f47fa48e8fe1d32f658b68239612e6b9b87901f1b7a0ee3b6ce0d49413abe2f5952e61a397e64eca704c6ab14e5095242e7e6e4210c3a98e03fe96e4454420c17ddf324c533ea6d673598c7357678b4ded2eb56e6334447dad1320c8b9843c3896d3a2f8d036686135b0585c6ed033c4166626caa0e2d40242ef3a564b746e15dcd9312f6105dc8b5d760b2c359def1bf6ae9bec1b1be127f19d2520f09834d5be86c588bb37ea32d8abc336f0db441940400aa462ea7fdfbfe83d49d90232216160943b05cc4c32446c7f6fdf74c12a6c058360edd2aaf648b850924189e0b3f82449b5c7ec1c23a0fe5ed404e21bb7c3df65dffe36f0c8c2ea0f8db028180a2a1182027f126a0bcacdb3e8fd3d57da33e9bd125e95fd90c08b837e58d00648f9ad6c3fd9522b9cfbf56e1bce110dcddc35b3293fcf10b916f0c4691f19b00c616de739051cedec3eb907241fd8c1722c264df367fd7e255921057d4d8ffda357552cfb255d026192cec7d377810bedf49b296dd1455bd7122aff13912e892ae11359449d2f04faafb64af90409d9a703b3be0cd080f1379ad7cf50af77a1146cb16feb4b523c3c8899b78960eeb4f809466d7142530dd43310f4b47bb2caadea878970ef4213f5d8697e5c3670823aa59c30a33e1a746c8d1feb7cebc1ab813bcff9955c914f467b61d7d4794fbdfc7c0b35beec0c0072945bc216f3b227c6d332946b427bb5d67cea5d822c73b146eb565b53d35459c8f7761d53cfba0169ec74537d678b843e2626cc8f1c108e51a1ba8ff1e64879699473ce024a20e78b8019ae0642643af1aa8d35a0a2f5ee6a093822f3ba3725cf26967cfe7c7a91b5f1d0b5dcd43a2de4b1c1459c8f3349b61c5946e49c13996f416662db7f5a76a11b553ec0532010cc247ddc4d642652b7a84f566a0746bd08f9459b903e24ca56863500114b76566590274a26b73bc58e422220d31f8fcfea50a961700d9c264accac3e3da7abb442848b6c6385af76e11410522953c34455e413c0c9d1a5865f13d6cb91a91ba5d1e2984b211adadca130d6bb15b13db840e3a081c86cae257b824194f1f5d63fd91e5892b3f238cb6807ddd6f656c25a75bfba3436855e9512a77f91611f20879e3577e5fcc891e46d6e6fd5414f1281cdf776b90e19fcc48775eb6f56dd036b1967f248d2e565d8aa6be5f8ac3c332cfddcba1ae6c9ba00187c8b3ba2052543f09cd97e793cd354c49fafe31371d2caed70343f9e6d957c426389981f36c8af9465b08231ec8c2752d6cf7f7d9064da26bce8e6fb671533b3258f885c86f532fbc1006aba680097f67dd429670ec99caf8796a497b6b5de1de46e1d453022f162b8177cd8f1198a1ae6f61a10830382c76d839ffe910ed957f46e55f05858bef30b2f0cc4d3aa4d8a12d1e29c129a5240a9b2e9fb99bbee49539fc20667ed7a41d99b2ae1b620a72ec1f0b2d64402ab72e9120c0d65bce6b6f0904ec53869b833df3d176aa707983aaed723d07b948c14bd20f3d1bd7312203c680531d29f58fc2ece4b325dd6f94092aba95c63de76ff752a093c840c2cacdcff513b27f20aa9e73a3d47597a01eb6fd8de0ef65fed3a66b92d4e333d3d4138f32c4a9ef611f1143cc45caefbe71efdf37b7f68b031440834b3cd52d417a86c85d5c2e2cb5684b3f28988f155803cec48824393abc458913dffe635f9b689c732b1fea23cae4d71cc3233cbff6bfb772a53ba59c99133c91bf2fb3368baa57024b76e3193cfa74449d10424e3c682a74ad85d361660b839a6bf4ae99d01d3c013e22d136900e267f4d9a0365e4a306b7373e19636d7caeb3a0c387edd6b73dbff2d5a82f94430fe567692bddc9efbc643baa1897dbe9d46a007e8102d66ac107a69cceb20666fad09410dab9a1443f7f87db66f8bdf3c9daf96b7e082517c82279d9e32a2b7945707ddfc7450743389b3f5a7fe8268c9631b70c2a5ee8da86a0139fe2e7efd22b24cb6f5df18abacb00e347c5c20c40868cd4ade5872825d096c4a5883d3ca9936500698332b7e838e653212f60fc8333fced85243f16efcc827ea8868d69b613210b73bba8abe5538aa4623d06d2a1e82b16a9fc94842cf840f4a8982095ef6e44c4ddf875bba9175f0a248d20bb98c902b4438195797eb1130a65e52681222b8a361284b81947ea8e97af1f7b01987780b8b8f56147c2e9f89b9a404889890e26713fe5108f8516af510b05d04c0b1b49e5407a0963492691c3313f94871cacc5365da935db8797df3177c673d610f219604dac99ae468e3b9ffe4a4e9cdb9d7c7914dd787b0136c35fde1a0de15a1a7641542b95b0664c4d7792e10b6b548077a8617ca3e283c808ed1b592bb93bb43a61d7468f238e815b53f071bb41df2d7b300a7b452b31509b2c8ad37f9d33fc3408c8ba55fd75b82dfa15a0501b8af6d7c1531cd45dcddd4a636e1e85511021a605eea78f7cbf74965f5e51ae15e3e5a460d199bb0663fc3ff8fb239b44d662a9719a0b39f0327174bb2851328906d7e19b3368e9994843394733a0a17c1a35fb7899622010a5bb15ae71d2da6fd8a54ab3f578fc210f359f244126e95bb61acd56347660cae6876216341442cab05fa85a279ea6618dbdd4179692a5900aa708c9e4f779431788c60212ae56720c803fa373a3914cb50db569a961b7cb4b8f4e3000f2a43fb8b139a8f7fdbe50e14f81df6d21e5756cda87f7902abcf54fce80e63964531ea38b7e95abcd6f82a40c485b4c90f7d352fe1926cae92fbf1baa26d6be02906ce353ca650fb50ef8e2b47a13c01dc1993610e78879fdc6d"}, {0xf0, 0x118, 0xfffffffb, "0ea5655fe677c34fd1553d0324a47b057ee15105deeac70ca524668c1d0e70ac0d581385034d84b731304ccb3222928c495da994db5ccf3b566bf728fd965cab1d1ddb11a678f4b317f24420e1574306f87db88a58c47f3cbf4a08a0d1919403a37cc71bcc8ca0adf9b4eaa2219e2359196a354dfdb93b303fbebbd082522a0b84a0ccd23c7bb94dd2b5e9d10c13d962075219daffef98d48f8a8d4fb5436ad994fb9e1eb30c971f07e2521723946681234bed849c96c2b24d25976952e9c0e9db93724b1c99214f4ee8f6f3fdaa672cce65c2fa37084cd6c8607d64f3e519"}, {0x48, 0x0, 0x100, "bb4268da1a3a6b3a88f1da6691358f5de4f55de27e583987a7985692b5d29751f509f947976dd5b0c33820f2a2bb6a6d45be303b"}, {0x20, 0xff, 0xff, "4cd9b83f32172275bb900c59"}], 0x11e0}}, {{0x0, 0x0, &(0x7f0000003bc0)=[{&(0x7f0000002a00)="aca28ea5712da362aa4d8bc94c5087393c04db6b03e2fe063023a9935412026b3becd8a0a9fbdd989ae9961fc649d8e6b9071155949355b57b6933b737c799688aa648b56f0b9e7d5edd6a3755e4754d55640685bf7ebfabe494dfdb71d769d8eadb68c53349257fbfd88a434313e7194f5fa89c5d1da76934d915b86c834f485ec68b0b88e4648f1a30a1914854c710fe812ec7026344bdcc4cc70aaeed9e608a257637c84ef94b291aff0b470d0399912f43c1708376928d4c18a8ac8244e68664662dd4faba63d6e87a8a53862f024cb3b026d8", 0xd5}, {&(0x7f0000002b00)="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", 0x1000}, {&(0x7f0000003b00)="6ac2599bdbc44e3d5c70013ab0b17d97f5c8ba9754fa0081cf06e4f489b4c4d9d95fe2d97f448968d8d405dbb5c0b8d36977e116d7d820c61c30e5c7b64fd9eb55ab05e0b75e50c33746dfcdaa2a64af0288d626419594c5502d2df1c83598cf", 0x60}, {&(0x7f0000003b80)="9112af35c8eab7cb2a", 0x9}], 0x4, &(0x7f0000003c00)=[{0xd8, 0x100, 0x8, "0c0c56165c49ad03a7ce531d0cffe14dd9f396c07c9af06a9a1eb0fe8df00e3893d9dcc9f3a0dad96b0163fbc66e76ef6d8d180f7ddcd3cdbb757b3b6e07e6a4c13c70f565847587fd922856e0787856b47e625530e175593a27b1e8d2ac516a02efee24d7bc32a9d89a13a87fbb2645176b57273f2018e6964599a264a9226ec91c10d171ce6afc4d2bb3939ea8d7153eac4bdf2a058661c60c16617c2223f4948bac5ea4cbb91ba5c4096b42258425e281adde8de3e2df0e75731cbdcb9b802ee52c7c03e743aa"}, {0x48, 0x10c, 0x1, "561eab901d3358842af68b3256ebbf5419e3813ecec888ae9b6383511cf69334ee6349d72ae9b664655f1d4ef7b9368aab765712"}, {0x98, 0x119, 0x1, "ca8af41fdb38fbc445edacc54cca251d900b4a4fec746fa4e814d88820726abff0dda4d19fe3f5640c3081d2eef287a1d406579f74895266c1e792622f26bc8870ac0212ac7171f7e453c8e02c38a71602e22d6811c1eecba14c5d7ebe7afd68220fa4740cea48deb354950337da7da44560b1666f210a42e659ec0b28db8428b76b3b3b"}], 0x1b8}}], 0x5, 0x4008000) [ 1673.617044][ T3878] loop1: detected capacity change from 0 to 140 [ 1673.640513][ T3878] EXT4-fs (loop1): bad geometry: first data block 67502081 is beyond end of filesystem (64) 01:10:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000018000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000051300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:50 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x1c000000, 0x0, 0x400001) 01:10:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000000000001c000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000061300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1673.712768][ T3878] loop1: detected capacity change from 0 to 140 [ 1673.730446][ T3878] EXT4-fs (loop1): bad geometry: first data block 67502081 is beyond end of filesystem (64) 01:10:50 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) ioctl$FS_IOC_READ_VERITY_METADATA(r0, 0xc0286687, &(0x7f00000002c0)={0x1, 0x9, 0x5b, &(0x7f0000000240)=""/91}) syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r1, 0xffffffffffffffff, 0x2) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x80800) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000100)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2, 0x3, r0, &(0x7f0000000040)="cec89d5469c1457ec76cb7105758f6eaa4e840eb5d3bee0849e8786d9fe09c47d3d193550f743f2588", 0x29, 0x200, 0x0, 0x0, r2}]) fgetxattr(r1, 0x0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) r3 = syz_io_uring_setup(0x7fe5, &(0x7f0000000340)={0x0, 0x2000, 0x0, 0x2, 0x8}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00006d6000/0x1000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x40, &(0x7f0000000000)=0x1000307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r4, r5, &(0x7f00000000c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r6, 0x0, 0x0}, 0x0) io_uring_enter(r3, 0x2a6e, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0xa, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 01:10:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010010040000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000026000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000071300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:50 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x3f000000, 0x0, 0x400001) 01:10:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000000000003f000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1673.904956][ T3927] loop1: detected capacity change from 0 to 140 01:10:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000081300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1673.952573][ T3927] EXT4-fs (loop1): bad geometry: first data block 68157441 is beyond end of filesystem (64) 01:10:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000040000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb0300000a1300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:50 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x7ffffffffffff, 0x0, 0x400001) 01:10:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000080040000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1674.044514][ T3927] loop1: detected capacity change from 0 to 140 [ 1674.058941][ T3927] EXT4-fs (loop1): bad geometry: first data block 68157441 is beyond end of filesystem (64) 01:10:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb0300000b1300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:51 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x104000000000000, 0x0, 0x400001) 01:10:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000050000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000577000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000181300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1674.335282][ T3986] loop1: detected capacity change from 0 to 140 01:10:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000f0ff7f000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1674.386214][ T3986] EXT4-fs (loop1): bad geometry: first data block 83886081 is beyond end of filesystem (64) 01:10:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb0300001c1300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000480000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:51 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x200000000000000, 0x0, 0x400001) [ 1674.475922][ T3986] loop1: detected capacity change from 0 to 140 [ 1674.488279][ T3986] EXT4-fs (loop1): bad geometry: first data block 83886081 is beyond end of filesystem (64) 01:10:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000261300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000060000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000ffffff85000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:51 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x400000000000000, 0x0, 0x400001) 01:10:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000fe1300000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1674.609302][ T4024] loop1: detected capacity change from 0 to 140 [ 1674.634207][ T4024] EXT4-fs (loop1): bad geometry: first data block 100663297 is beyond end of filesystem (64) 01:10:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000000118c0000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000004000000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000fffffdef000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1674.736112][ T4024] loop1: detected capacity change from 0 to 140 [ 1674.745128][ T4024] EXT4-fs (loop1): bad geometry: first data block 100663297 is beyond end of filesystem (64) 01:10:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010004060000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:51 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x600000000000000, 0x0, 0x400001) 01:10:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000fffffff6000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000fffe00000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1674.871900][ T4059] loop1: detected capacity change from 0 to 140 [ 1674.906946][ T4059] EXT4-fs (loop1): bad geometry: first data block 100925441 is beyond end of filesystem (64) 01:10:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000fffffdfc000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb03000000fe00000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000fffffdfd000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1675.002475][ T4059] loop1: detected capacity change from 0 to 140 [ 1675.010618][ T4059] EXT4-fs (loop1): bad geometry: first data block 100925441 is beyond end of filesystem (64) 01:10:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000070000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:51 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x1200000000000000, 0x0, 0x400001) 01:10:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000fffffffe000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb03000000feff000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1675.159674][ T4099] loop1: detected capacity change from 0 to 140 [ 1675.198427][ T4099] EXT4-fs (loop1): bad geometry: first data block 117440513 is beyond end of filesystem (64) 01:10:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000effdffff000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb03000000feffffff23", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001302000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:52 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x1c00000000000000, 0x0, 0x400001) 01:10:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000fcfdffff000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1675.302367][ T4099] loop1: detected capacity change from 0 to 140 [ 1675.315294][ T4099] EXT4-fs (loop1): bad geometry: first data block 117440513 is beyond end of filesystem (64) 01:10:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001303000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000090000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000fdfdffff000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001304000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:52 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x3f00000000000000, 0x0, 0x400001) 01:10:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000085ffffff000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1675.481744][ T4143] loop1: detected capacity change from 0 to 140 [ 1675.520190][ T4143] EXT4-fs (loop1): bad geometry: first data block 150994945 is beyond end of filesystem (64) 01:10:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001305000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000f6ffffff000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1675.582825][ T4143] loop1: detected capacity change from 0 to 140 [ 1675.612837][ T4143] EXT4-fs (loop1): bad geometry: first data block 150994945 is beyond end of filesystem (64) 01:10:52 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0xffffffffffff0700, 0x0, 0x400001) 01:10:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b000000050000000100000a0000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000feffffff000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001306000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:52 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x2, 0x400001) 01:10:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001307000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000037dc125020000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1675.773298][ T4185] loop1: detected capacity change from 0 to 140 [ 1675.801078][ T4185] EXT4-fs (loop1): bad geometry: first data block 167772161 is beyond end of filesystem (64) 01:10:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001308000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000100000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1675.865409][ T4185] loop1: detected capacity change from 0 to 140 [ 1675.873815][ T4185] EXT4-fs (loop1): bad geometry: first data block 167772161 is beyond end of filesystem (64) 01:10:52 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x4, 0x400001) 01:10:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b000000050000000100000b0000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000800000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb03000000130a000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1676.006113][ T4221] loop1: detected capacity change from 0 to 140 01:10:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb03000000130b000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000f0ffffff7f00000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1676.055273][ T4221] EXT4-fs (loop1): bad geometry: first data block 184549377 is beyond end of filesystem (64) 01:10:53 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x6, 0x400001) [ 1676.132656][ T4221] loop1: detected capacity change from 0 to 140 [ 1676.145759][ T4221] EXT4-fs (loop1): bad geometry: first data block 184549377 is beyond end of filesystem (64) 01:10:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001318000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000001000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b000000050000000100000c0000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb03000000131c000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000ffffffffffff07000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1676.299008][ T4261] loop1: detected capacity change from 0 to 140 01:10:53 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x12, 0x400001) 01:10:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000020000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001326000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1676.352839][ T4261] EXT4-fs (loop1): bad geometry: first data block 201326593 is beyond end of filesystem (64) 01:10:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb0300000013fe000023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1676.437741][ T4261] loop1: detected capacity change from 0 to 140 [ 1676.448524][ T4261] EXT4-fs (loop1): bad geometry: first data block 201326593 is beyond end of filesystem (64) 01:10:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000040000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b000000050000000100000d0000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:53 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x1c, 0x400001) 01:10:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001304020023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000000000007ffff0000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1676.620186][ T4307] loop1: detected capacity change from 0 to 140 01:10:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001300030023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1676.661135][ T4307] EXT4-fs (loop1): bad geometry: first data block 218103809 is beyond end of filesystem (64) 01:10:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000007ffffffff0000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:53 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x104, 0x400001) 01:10:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001302040023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1676.739962][ T4307] loop1: detected capacity change from 0 to 140 [ 1676.752263][ T4307] EXT4-fs (loop1): bad geometry: first data block 218103809 is beyond end of filesystem (64) 01:10:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b000000050000000100000e0000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000010401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001306040023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000020401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:53 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x600, 0x400001) [ 1676.898784][ T4344] loop1: detected capacity change from 0 to 140 [ 1676.935462][ T4344] EXT4-fs (loop1): bad geometry: first data block 234881025 is beyond end of filesystem (64) 01:10:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001380040023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1677.003854][ T4344] loop1: detected capacity change from 0 to 140 [ 1677.012547][ T4344] EXT4-fs (loop1): bad geometry: first data block 234881025 is beyond end of filesystem (64) 01:10:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001300050023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000004020401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b000000050000000100000f0000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb0300000013a5050023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:54 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x1200, 0x400001) 01:10:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000030401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1677.181421][ T4381] loop1: detected capacity change from 0 to 140 [ 1677.206379][ T4381] EXT4-fs (loop1): bad geometry: first data block 251658241 is beyond end of filesystem (64) 01:10:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000000000000225c17d030401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001300060023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:54 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x1c00, 0x400001) 01:10:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000040401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1677.293117][ T4381] loop1: detected capacity change from 0 to 140 [ 1677.321441][ T4381] EXT4-fs (loop1): bad geometry: first data block 251658241 is beyond end of filesystem (64) 01:10:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001304060023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1677.452113][ T1041] ================================================================== [ 1677.460212][ T1041] BUG: KCSAN: data-race in __lru_add_drain_all / lru_cache_add [ 1677.467771][ T1041] [ 1677.470088][ T1041] write to 0xffff888237c22528 of 1 bytes by task 4413 on cpu 0: [ 1677.477704][ T1041] lru_cache_add+0x75/0x150 [ 1677.482206][ T1041] shmem_getpage_gfp+0xca9/0x13c0 [ 1677.487234][ T1041] shmem_fallocate+0x598/0x8b0 [ 1677.492019][ T1041] vfs_fallocate+0x459/0x6a0 [ 1677.496606][ T1041] __x64_sys_fallocate+0x75/0xc0 [ 1677.501539][ T1041] do_syscall_64+0x3d/0x90 [ 1677.505969][ T1041] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1677.511946][ T1041] [ 1677.514263][ T1041] read to 0xffff888237c22528 of 1 bytes by task 1041 on cpu 1: [ 1677.521821][ T1041] __lru_add_drain_all+0x12c/0x3e0 [ 1677.526934][ T1041] lru_add_drain_all+0xc/0x10 [ 1677.531610][ T1041] invalidate_bdev+0x56/0x80 [ 1677.536196][ T1041] bdev_disk_changed+0xf6/0xe60 [ 1677.541055][ T1041] blkdev_get_by_dev+0x6aa/0xca0 [ 1677.545990][ T1041] blkdev_common_ioctl+0x102a/0x10a0 [ 1677.551271][ T1041] blkdev_ioctl+0x16e/0x3e0 [ 1677.555774][ T1041] block_ioctl+0x6d/0x80 [ 1677.560013][ T1041] __se_sys_ioctl+0xcb/0x140 [ 1677.564602][ T1041] __x64_sys_ioctl+0x3f/0x50 [ 1677.569190][ T1041] do_syscall_64+0x3d/0x90 [ 1677.573632][ T1041] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1677.579524][ T1041] [ 1677.581837][ T1041] value changed: 0x08 -> 0x0f [ 1677.586505][ T1041] [ 1677.588820][ T1041] Reported by Kernel Concurrency Sanitizer on: 01:10:54 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0xfffffd, 0x20000) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {0x0, r6}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {0x0, r6}, {r5}, {}, {r4}, {}, {r4}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {r5}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {r5}, {0x0, r6}, {}, {r4}, {}, {}, {0x0, r6}, {}, {r5}, {r4}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {r5}, {r4, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {}, {}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {r5, r6}, {}, {r4}, {r4, r6}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {}, {}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5, r6}, {0x0, r6}, {}, {r5, r6}, {r5}, {}, {0x0, r6}, {r4}, {0x0, r6}, {r5, r6}, {r4}, {0x0, r6}, {r5, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {r5}, {0x0, r6}, {r5}, {0x0}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {r4, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {r4}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r5, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {r5}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {}, {}, {r5, r6}, {r4, r6}, {0x0, r6}, {r4}, {r5, r6}, {r4, r6}, {r5}, {}, {}, {}, {}, {}, {r4}, {0x0, r6}, {r4, r6}, {0x0, r6}, {r5}, {r5}, {r4}, {0x0, r6}, {r5, r6}, {r5}, {0x0, r6}, {}, {}, {}, {0x0, r6}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f000004b480)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f000004c480)={0x7ff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {r4}, {}, {0x0, r8}], 0xbb, "de0a643f817ba2"}) r9 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r9, 0xffffffffffffffff, 0x2) fgetxattr(r9, 0x0, 0x0, 0x0) ioctl$EVIOCGBITSND(r9, 0x80404532, &(0x7f0000000240)=""/85) ioctl$EVIOCGBITSND(r2, 0x80404532, &(0x7f00000000c0)=""/118) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x3, 0x0, 0x1000000) 01:10:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000050401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1677.594959][ T1041] CPU: 1 PID: 1041 Comm: systemd-udevd Not tainted 5.14.0-syzkaller #0 [ 1677.603196][ T1041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1677.613259][ T1041] ================================================================== 01:10:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010004100000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001300070023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:54 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x3f00, 0x400001) 01:10:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000060401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000a0023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:54 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r0, 0xffffffffffffffff, 0x2) fgetxattr(r0, 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x181000, 0x94) r1 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r2 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r1, 0x0, 0x0, 0x400001) fallocate(r1, 0x3, 0x0, 0x1000000) ioctl$EVIOCGUNIQ(r2, 0x80404508, &(0x7f00000000c0)=""/25) [ 1677.711088][ T4437] loop1: detected capacity change from 0 to 140 [ 1677.745494][ T4437] EXT4-fs (loop1): bad geometry: first data block 268697601 is beyond end of filesystem (64) 01:10:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000004060401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000b0023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1677.845290][ T4437] loop1: detected capacity change from 0 to 140 [ 1677.852290][ T4437] EXT4-fs (loop1): bad geometry: first data block 268697601 is beyond end of filesystem (64) 01:10:54 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x1040000, 0x400001) 01:10:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000070401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:54 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x7, 0x0) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r3) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000240)=""/4096) r4 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r4, 0xffffffffffffffff, 0x2) fgetxattr(r4, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0xb125d000) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x3, 0x0, 0x1000000) 01:10:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001300180023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010020100000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000080401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb0300000013001c0023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1677.987405][ T4481] loop1: detected capacity change from 0 to 140 [ 1678.006689][ T4481] EXT4-fs (loop1): bad geometry: first data block 270532609 is beyond end of filesystem (64) 01:10:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001300200023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000000000000000000a0401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1678.094057][ T4481] loop1: detected capacity change from 0 to 140 [ 1678.115245][ T4481] EXT4-fs (loop1): bad geometry: first data block 270532609 is beyond end of filesystem (64) 01:10:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000000000000000000b0401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001300260023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000110000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:55 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x2000000, 0x400001) 01:10:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000180401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb0300000013003f0023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1678.261600][ T4514] loop1: detected capacity change from 0 to 140 [ 1678.288383][ T4514] EXT4-fs (loop1): bad geometry: first data block 285212673 is beyond end of filesystem (64) 01:10:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000000000000000001c0401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001300400023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000260401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1678.362509][ T4514] loop1: detected capacity change from 0 to 140 [ 1678.372465][ T4514] EXT4-fs (loop1): bad geometry: first data block 285212673 is beyond end of filesystem (64) 01:10:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000120000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001304800023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000000000000000003f0401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:55 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x4000000, 0x400001) 01:10:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001305a50023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000400401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1678.514419][ T4551] loop1: detected capacity change from 0 to 140 [ 1678.551216][ T4551] EXT4-fs (loop1): bad geometry: first data block 301989889 is beyond end of filesystem (64) 01:10:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb0300000013fffe0023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1678.632379][ T4551] loop1: detected capacity change from 0 to 140 [ 1678.642580][ T4551] EXT4-fs (loop1): bad geometry: first data block 301989889 is beyond end of filesystem (64) 01:10:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000800400401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb0300000013feff0023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000140000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000005770401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000040", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1678.801346][ T4590] loop1: detected capacity change from 0 to 140 01:10:55 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x6000000, 0x400001) 01:10:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000004800401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1678.848706][ T4590] EXT4-fs (loop1): bad geometry: first data block 335544321 is beyond end of filesystem (64) 01:10:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb0300000013fffffffe", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1678.932518][ T4590] loop1: detected capacity change from 0 to 140 [ 1678.942863][ T4590] EXT4-fs (loop1): bad geometry: first data block 335544321 is beyond end of filesystem (64) 01:10:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000ffffff850401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001300020023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b000000050000000100001b0000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000118c00401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001300030023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:56 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x12000000, 0x400001) 01:10:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000fffffffffffffdef0401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1679.106028][ T4631] loop1: detected capacity change from 0 to 140 [ 1679.134711][ T4631] EXT4-fs (loop1): bad geometry: first data block 452984833 is beyond end of filesystem (64) [ 1679.175070][ T4631] loop1: detected capacity change from 0 to 140 [ 1679.188280][ T4631] EXT4-fs (loop1): bad geometry: first data block 452984833 is beyond end of filesystem (64) 01:10:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001300040023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000fffffff60401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:56 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x1c000000, 0x400001) 01:10:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000200000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000fffffdfc0401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001300050023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1679.366416][ T4668] loop1: detected capacity change from 0 to 140 01:10:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000fffffdfd0401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001300060023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1679.411025][ T4668] EXT4-fs (loop1): bad geometry: first data block 536870913 is beyond end of filesystem (64) 01:10:56 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x3f000000, 0x400001) 01:10:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001300070023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000fffffffe0401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1679.472513][ T4668] loop1: detected capacity change from 0 to 140 [ 1679.497828][ T4668] EXT4-fs (loop1): bad geometry: first data block 536870913 is beyond end of filesystem (64) 01:10:56 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x7ffffffffffff, 0x400001) 01:10:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001300080023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010010200000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000fffffffffffffffe0401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:56 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x104000000000000, 0x400001) 01:10:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000a0023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000ffffffff0401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1679.681614][ T4711] loop1: detected capacity change from 0 to 140 [ 1679.711328][ T4711] EXT4-fs (loop1): bad geometry: first data block 537919489 is beyond end of filesystem (64) 01:10:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000b0023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000000007ffffffffffff0401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1679.772455][ T4711] loop1: detected capacity change from 0 to 140 [ 1679.788087][ T4711] EXT4-fs (loop1): bad geometry: first data block 537919489 is beyond end of filesystem (64) 01:10:56 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x200000000000000, 0x400001) 01:10:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001300180023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000220000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000effdffffffffffff0401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000feffffffffffffff0401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1679.938459][ T4747] loop1: detected capacity change from 0 to 140 [ 1679.971157][ T4747] EXT4-fs (loop1): bad geometry: first data block 570425345 is beyond end of filesystem (64) 01:10:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb0300000013001c0023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:56 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x400000000000000, 0x400001) [ 1680.042344][ T4747] loop1: detected capacity change from 0 to 140 [ 1680.055640][ T4747] EXT4-fs (loop1): bad geometry: first data block 570425345 is beyond end of filesystem (64) 01:10:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000ffffffffffffffff0401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001300260023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000250000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:57 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x600000000000000, 0x400001) 01:10:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000010001000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001300fe0023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000301000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001300040223", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1680.204624][ T4784] loop1: detected capacity change from 0 to 140 [ 1680.233623][ T4784] EXT4-fs (loop1): bad geometry: first data block 620756993 is beyond end of filesystem (64) 01:10:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b000000050000000100002e0000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:57 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x1200000000000000, 0x400001) 01:10:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000323", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1680.302800][ T4784] loop1: detected capacity change from 0 to 140 [ 1680.309482][ T4784] EXT4-fs (loop1): bad geometry: first data block 620756993 is beyond end of filesystem (64) 01:10:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000020000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1680.375877][ T4809] loop1: detected capacity change from 0 to 140 [ 1680.405658][ T4809] EXT4-fs (loop1): bad geometry: first data block 771751937 is beyond end of filesystem (64) 01:10:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001300020423", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000030000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:57 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x1c00000000000000, 0x400001) 01:10:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001300060423", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000040000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1680.477102][ T4809] loop1: detected capacity change from 0 to 140 [ 1680.497825][ T4809] EXT4-fs (loop1): bad geometry: first data block 771751937 is beyond end of filesystem (64) 01:10:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001300800423", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b000000050000000100003f0000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000050000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:57 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x3f00000000000000, 0x400001) 01:10:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000523", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000060000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1680.688191][ T4851] loop1: detected capacity change from 0 to 140 [ 1680.725640][ T4851] EXT4-fs (loop1): bad geometry: first data block 1056964609 is beyond end of filesystem (64) 01:10:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001300a50523", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000070000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:57 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0xffffffffffff0700, 0x400001) [ 1680.802305][ T4851] loop1: detected capacity change from 0 to 140 [ 1680.814569][ T4851] EXT4-fs (loop1): bad geometry: first data block 1056964609 is beyond end of filesystem (64) 01:10:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000623", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000400000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000080000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001300040623", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:57 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400300) [ 1680.926773][ T4888] loop1: detected capacity change from 0 to 140 [ 1680.960815][ T4888] EXT4-fs (loop1): bad geometry: first data block 1073741825 is beyond end of filesystem (64) 01:10:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000000a0000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000723", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1681.022679][ T4888] loop1: detected capacity change from 0 to 140 [ 1681.032046][ T4888] EXT4-fs (loop1): bad geometry: first data block 1073741825 is beyond end of filesystem (64) 01:10:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000000b0000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000a23", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000450000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:58 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x7fffffffffffffff) 01:10:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000b23", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000180000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1681.207162][ T4928] loop1: detected capacity change from 0 to 140 [ 1681.234035][ T4928] EXT4-fs (loop1): bad geometry: first data block 1157627905 is beyond end of filesystem (64) 01:10:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001300001823", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="010000000000000000000000001c0000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1681.302667][ T4928] loop1: detected capacity change from 0 to 140 [ 1681.314811][ T4928] EXT4-fs (loop1): bad geometry: first data block 1157627905 is beyond end of filesystem (64) 01:10:58 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xffffffff, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fallocate(r0, 0x9, 0x400000000000, 0x20) fallocate(r0, 0x0, 0x0, 0x400001) 01:10:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001300001c23", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000260000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000460000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001300002023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000fe0000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:58 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0xe, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df00380a0000001f00"}) fallocate(r0, 0x0, 0x0, 0x400001) r2 = fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x2, 0x4000010, r2, 0xb1bfe000) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) write$evdev(r1, &(0x7f0000000240)=[{{0x77359400}, 0x0, 0x0, 0x8}, {{0x77359400}, 0x2, 0x5, 0x2}, {{r3, r4/1000+60000}, 0x12, 0x401, 0xe52}], 0x48) fallocate(r0, 0x0, 0x0, 0x400001) [ 1681.486870][ T4967] loop1: detected capacity change from 0 to 140 [ 1681.509266][ T4967] EXT4-fs (loop1): bad geometry: first data block 1174405121 is beyond end of filesystem (64) 01:10:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000040200000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001300002623", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000480000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000030002", 0x3d, 0x8c5f}], 0x0, &(0x7f0000010f60)) 01:10:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000300000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001300003f23", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1681.682357][ T4995] loop1: detected capacity change from 0 to 140 [ 1681.715651][ T4995] EXT4-fs (loop1): bad geometry: first data block 1207959553 is beyond end of filesystem (64) 01:10:58 executing program 3: r0 = memfd_create(&(0x7f0000001740)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xae\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xf4p\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T\x97PC4u\xa9\x83=\x9d(\xab\xaa\xbeG\xd9\xbf$\xac\xbd\xf4Rm>\xfa\x8cBS\xf3\xf8\xab\xdcJ3\t\x99\xd7D:I\xc2/\x1d\x13\xac?#!\xce\xfa\xce\xfb\xd4\xe3\x1fD\xfd\xee\x8e\xae\xbfp\xe79\xa5\x7f\xc74\xe3\xd6\xb7\xb1\xb7\xd0x\xf7\x86\x0e\xf5&\x8a\x15<\x13_\xdd\xfdu\x16\xd7H3\x86U,\xf4\xb4\xec\x98\xc7\xae\xe1\xfb\x87\x80\xf9\x05\x11Y\xe4<', 0x0) syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000140)=""/129, 0x81}], 0x1, 0x60, 0x5) r1 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000014c0), 0x2, 0x0) mmap(&(0x7f0000fec000/0x11000)=nil, 0x11000, 0x0, 0x4000010, r1, 0xfedf0000) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) fgetxattr(r2, 0x0, 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0), 0x400000, 0x0) recvmsg$unix(r3, &(0x7f0000001480)={&(0x7f0000000240)=@abs, 0x6e, &(0x7f0000000100)=[{&(0x7f00000002c0)=""/169, 0xa9}, {&(0x7f0000000380)=""/4083, 0xff3}], 0x2, &(0x7f0000001640)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001400e4ff0000000001000098feb40001b37fbd4b40e6858d420f50656f3e", @ANYRES32, @ANYBLOB="0000000020000000000000800100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xe8}, 0x41) r5 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r5, 0xffffffffffffffff, 0x2) fgetxattr(r5, 0x0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r4, 0x80104592, &(0x7f0000000040)={0x0, 0x1a, 0x5, 0x22, "ed005400000400003e083e20000000eb000000000200"}) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x400001) r6 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r6, 0xffffffffffffffff, 0x2) fgetxattr(r6, 0x0, 0x0, 0x0) close_range(r0, r6, 0x0) 01:10:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000020400000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001300004023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="000000000000000000000000000000000000000000000000000000005178aedb030000001300048023", 0x29, 0x7e0}, {&(0x7f0000000140)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f0948551b18e36e65c75f000000000000030002000000000008", 0x4a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:10:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000060400000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1681.822552][ T4995] loop1: detected capacity change from 0 to 140 [ 1681.839065][ T4995] EXT4-fs (loop1): bad geometry: first data block 1207959553 is beyond end of filesystem (64) 01:10:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010