48b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r1, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  716.179085][ T5926] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  716.230426][ T5931] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  716.288357][ T5940] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  716.299409][ T5926] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  716.309310][ T5931] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  716.342436][ T5931] EXT4-fs (loop2): corrupt root inode, run e2fsck
[  716.349305][ T5926] EXT4-fs error (device loop5): ext4_fill_super:4489: inode #2: comm syz-executor.5: iget: root inode unallocated
[  716.363627][ T5931] EXT4-fs (loop2): mount failed
03:42:13 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804002519000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  716.399128][ T5926] EXT4-fs (loop5): get root inode failed
[  716.423609][ T5926] EXT4-fs (loop5): mount failed
[  716.491017][ T5950] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  716.514825][ T5950] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  716.531473][ T5950] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:42:13 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9b}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:13 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804002d19000300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  716.599855][ T5955] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  716.639005][ T5955] EXT4-fs (loop0): #clusters per group too big: 16384
[  716.658112][ T5956] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:13 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe05", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x92}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  716.714929][ T5956] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  716.813713][ T5956] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
03:42:14 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000c00e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  716.889043][ T5956] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  716.908110][ T5968] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  716.950014][ T5956] EXT4-fs (loop1): orphan cleanup on readonly fs
[  716.979075][ T5956] EXT4-fs error (device loop1): ext4_orphan_get:1252: comm syz-executor.1: bad orphan inode 134755
[  716.996756][ T5976] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended
[  717.039242][ T5977] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  717.055397][ T5976] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  717.074408][ T5956] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue
03:42:14 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804002d19000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  717.125153][ T5986] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended
[  717.136727][ T5977] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  717.136915][ T5976] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  717.168808][ T5989] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  717.170023][ T5977] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:42:14 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r1, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  717.219072][ T5986] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  717.244040][ T5976] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  717.249628][ T5989] EXT4-fs (loop0): #clusters per group too big: 16384
[  717.271142][ T5986] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  717.282646][ T5986] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  717.286538][ T5976] EXT4-fs (loop2): corrupt root inode, run e2fsck
[  717.312654][ T5976] EXT4-fs (loop2): mount failed
03:42:14 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000d00e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  717.317465][ T5986] EXT4-fs error (device loop5): ext4_fill_super:4489: inode #2: comm syz-executor.5: iget: root inode unallocated
[  717.343758][ T5986] EXT4-fs (loop5): get root inode failed
[  717.349736][ T5986] EXT4-fs (loop5): mount failed
03:42:14 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804002f19000300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:14 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe05", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x92}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  717.549538][ T6002] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:42:14 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9b}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  717.685985][ T6014] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  717.740267][ T6014] EXT4-fs (loop0): #clusters per group too big: 16384
03:42:14 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804004819000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  717.790887][ T6017] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  717.804114][ T6016] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  717.835909][ T6017] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  717.845424][ T6016] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  717.874913][ T6016] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  717.887290][ T6017] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  717.899140][ T6016] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
03:42:15 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000e00e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  717.962498][ T6016] EXT4-fs (loop1): orphan cleanup on readonly fs
[  717.972055][ T6016] EXT4-fs error (device loop1): ext4_orphan_get:1252: comm syz-executor.1: bad orphan inode 135215
[  717.983952][ T6016] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue
[  718.030990][ T6032] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended
[  718.058098][ T6031] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:15 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804004819000300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  718.075909][ T6032] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  718.118608][ T6031] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  718.138563][ T6039] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  718.146206][ T6032] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
03:42:15 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r1, &(0x7f0000000080)=""/83, 0x39f)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  718.162414][ T6031] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  718.171859][ T6032] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  718.195992][ T6031] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  718.225117][ T6032] EXT4-fs error (device loop5): ext4_fill_super:4489: inode #2: comm syz-executor.5: iget: root inode unallocated
[  718.257356][ T6032] EXT4-fs (loop5): get root inode failed
[  718.264134][ T6031] EXT4-fs (loop2): corrupt root inode, run e2fsck
03:42:15 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804004c19000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  718.271499][ T6031] EXT4-fs (loop2): mount failed
[  718.281882][ T6032] EXT4-fs (loop5): mount failed
[  718.337008][ T6045] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  718.348747][ T6045] EXT4-fs (loop0): #clusters per group too big: 16384
03:42:15 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f2", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9c}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  718.491412][ T6055] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:15 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000f00e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:15 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f07", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x98}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  718.560183][ T6055] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  718.643683][ T6063] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  718.659658][ T6055] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:42:15 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804004c19000300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  718.798216][ T6071] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended
[  718.815429][ T6070] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  718.817780][ T6075] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended
[  718.846957][ T6077] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:16 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804005c19000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  718.893781][ T6071] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  718.894984][ T6070] EXT4-fs (loop1): bad geometry: block count 34359739448 exceeds size of device (66048 blocks)
[  718.909010][ T6077] EXT4-fs (loop0): #clusters per group too big: 16384
[  718.951435][ T6071] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  718.961723][ T6075] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  718.976636][ T6075] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  718.993740][ T6071] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  718.995367][ T6075] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock
03:42:16 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019001000e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  719.060548][ T6071] EXT4-fs (loop2): corrupt root inode, run e2fsck
[  719.085922][ T6075] EXT4-fs error (device loop5): ext4_fill_super:4489: inode #2: comm syz-executor.5: iget: root inode unallocated
[  719.086091][ T6071] EXT4-fs (loop2): mount failed
[  719.112919][ T6090] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:16 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r1, &(0x7f0000000080)=""/83, 0x39f)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  719.169034][ T6090] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  719.177818][ T6075] EXT4-fs (loop5): get root inode failed
[  719.188301][ T6075] EXT4-fs (loop5): mount failed
[  719.200497][ T6090] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:42:16 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f07", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x98}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  719.371029][ T6097] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  719.417516][ T6101] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  719.417521][ T6106] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:16 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804005c19000300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:16 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f2", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9c}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  719.503026][ T6101] EXT4-fs (loop0): #clusters per group too big: 16384
03:42:16 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804006019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  719.546185][ T6106] EXT4-fs (loop1): bad geometry: block count 34359739448 exceeds size of device (66048 blocks)
03:42:16 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019001100e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:16 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r1, &(0x7f0000000080)=""/83, 0x39f)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  719.757365][ T6117] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended
[  719.767996][ T6124] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended
[  719.778687][ T6123] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  719.839183][ T6127] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  719.842451][ T6124] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  719.874885][ T6117] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  719.890141][ T6123] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  719.910887][ T6117] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  719.923666][ T6123] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  719.933411][ T6124] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  719.948553][ T6117] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  719.969793][ T6124] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  719.998173][ T6117] EXT4-fs error (device loop5): ext4_fill_super:4489: inode #2: comm syz-executor.5: iget: root inode unallocated
[  720.010774][ T6124] EXT4-fs (loop2): corrupt root inode, run e2fsck
[  720.019646][ T6124] EXT4-fs (loop2): mount failed
[  720.025209][ T6117] EXT4-fs (loop5): get root inode failed
[  720.036896][ T6117] EXT4-fs (loop5): mount failed
03:42:17 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804006019000300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  720.045220][ T6139] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  720.056080][ T6139] EXT4-fs (loop0): #clusters per group too big: 16384
03:42:17 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804006819000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:17 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019001200e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  720.239618][ T6148] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:17 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f07", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x98}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:17 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f2", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9c}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  720.294472][ T6148] EXT4-fs (loop1): bad geometry: block count 34359739448 exceeds size of device (66048 blocks)
[  720.417310][ T6153] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:17 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  720.467919][ T6153] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  720.486409][ T6153] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:42:17 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804006819000300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  720.569089][ T6168] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended
[  720.571060][ T6159] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  720.604920][ T6168] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  720.635619][ T6167] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  720.648347][ T6170] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended
[  720.659515][ T6168] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  720.680209][ T6159] EXT4-fs (loop0): #clusters per group too big: 16384
[  720.687284][ T6168] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  720.701020][ T6170] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  720.711643][ T6168] EXT4-fs (loop2): corrupt root inode, run e2fsck
[  720.718182][ T6170] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  720.722928][ T6168] EXT4-fs (loop2): mount failed
[  720.729094][ T6170] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  720.762826][ T6170] EXT4-fs error (device loop5): ext4_fill_super:4489: inode #2: comm syz-executor.5: iget: root inode unallocated
[  720.794316][ T6170] EXT4-fs (loop5): get root inode failed
[  720.840936][ T6170] EXT4-fs (loop5): mount failed
03:42:18 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804006c19000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  720.870367][ T6179] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  720.889027][ T6179] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
03:42:18 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019002300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:18 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  720.950578][ T6179] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
03:42:18 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9b}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  720.993993][ T6191] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  721.054372][ T6191] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  721.076900][ T6179] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue
03:42:18 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  721.118140][ T6191] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:42:18 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804006c19000300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  721.263144][ T6202] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  721.317578][ T6206] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended
[  721.340633][ T6208] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  721.362292][ T6208] EXT4-fs (loop0): #clusters per group too big: 16384
[  721.370158][ T6206] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  721.384451][ T6206] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  721.394946][ T6206] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  721.421967][ T6209] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended
[  721.479581][ T6206] EXT4-fs (loop2): orphan cleanup on readonly fs
[  721.485955][ T6206] EXT4-fs error (device loop2): ext4_orphan_get:1252: comm syz-executor.2: bad orphan inode 136412
[  721.513325][ T6220] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
03:42:18 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804007419000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  721.523530][ T6209] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
03:42:18 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019002d00e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  721.583987][ T6220] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  721.586118][ T6209] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  721.621529][ T6206] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  721.635079][ T6220] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  721.695827][ T6220] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue
[  721.714703][ T6229] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:18 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  721.750521][ T6209] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  721.759056][ T6229] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  721.781528][ T6229] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  721.803075][ T6209] EXT4-fs (loop5): corrupt root inode, run e2fsck
[  721.840248][ T6234] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:42:19 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  721.863287][ T6209] EXT4-fs (loop5): mount failed
03:42:19 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804007419000300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  721.912969][ T6237] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  721.927661][ T6237] EXT4-fs (loop0): #clusters per group too big: 16384
03:42:19 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019002f00e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:19 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9b}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:19 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804007a19000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  722.224286][ T6253] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  722.279051][ T6253] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  722.309586][ T6253] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:42:19 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804007a19000300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  722.447546][ T6265] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended
[  722.474369][ T6267] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  722.484875][ T6266] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended
[  722.484881][ T6259] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  722.484891][ T6259] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  722.494208][ T6267] EXT4-fs (loop0): #clusters per group too big: 16384
[  722.503979][ T6270] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  722.530538][ T6265] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  722.559402][ T6266] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  722.574604][ T6266] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  722.584939][ T6259] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  722.589250][ T6265] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  722.595578][ T6266] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  722.629029][ T6265] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  722.653507][ T6259] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue
03:42:19 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900b401e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  722.698773][ T6266] EXT4-fs (loop5): corrupt root inode, run e2fsck
[  722.729979][ T6265] EXT4-fs (loop2): orphan cleanup on readonly fs
03:42:19 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804007d19000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  722.749326][ T6266] EXT4-fs (loop5): mount failed
[  722.752493][ T6265] EXT4-fs error (device loop2): ext4_orphan_get:1252: comm syz-executor.2: bad orphan inode 136539
[  722.767997][ T6284] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:19 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  722.814332][ T6265] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  722.829285][ T6284] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  722.850027][ T6284] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:42:20 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:20 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9b}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:20 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400002d000300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  723.069207][ T6296] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  723.131479][ T6302] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  723.140436][ T6296] EXT4-fs (loop0): #clusters per group too big: 16384
03:42:20 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900ac03e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  723.303690][ T6316] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended
[  723.313641][ T6316] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  723.333895][ T6314] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  723.391018][ T6316] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  723.401152][ T6319] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  723.418437][ T6314] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  723.425096][ T6316] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  723.438376][ T6318] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended
[  723.453551][ T6314] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  723.457812][ T6319] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  723.472268][ T6318] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
03:42:20 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400002d000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  723.501454][ T6316] EXT4-fs (loop2): orphan cleanup on readonly fs
[  723.502466][ T6319] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  723.529642][ T6318] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  723.532208][ T6316] EXT4-fs error (device loop2): ext4_orphan_get:1252: comm syz-executor.2: bad orphan inode 136667
[  723.553401][ T6314] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue
[  723.584658][ T6318] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  723.595362][ T6316] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  723.626668][ T6318] EXT4-fs (loop5): corrupt root inode, run e2fsck
[  723.643379][ T6318] EXT4-fs (loop5): mount failed
[  723.666636][ T6332] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:20 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:20 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r1, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:20 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000007000300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  723.675842][ T6332] EXT4-fs (loop0): #clusters per group too big: 16384
03:42:20 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900bf03e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  723.824972][ T6338] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:42:21 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f2", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9c}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  723.969524][ T6349] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  724.041339][ T6349] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  724.067978][ T6353] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:21 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000007000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  724.092115][ T6354] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  724.106705][ T6349] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  724.123080][ T6353] EXT4-fs (loop0): #clusters per group too big: 16384
[  724.134736][ T6354] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  724.155456][ T6354] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
03:42:21 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400002d000300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  724.210392][ T6354] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue
[  724.265727][ T6360] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended
[  724.301227][ T6371] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:21 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  724.304219][ T6360] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  724.335214][ T6374] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  724.356229][ T6360] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
03:42:21 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900c003e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  724.370657][ T6371] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  724.396637][ T6371] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  724.414909][ T6360] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  724.427916][ T6371] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  724.460410][ T6360] EXT4-fs (loop2): orphan cleanup on readonly fs
[  724.513389][ T6384] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  724.540316][ T6371] EXT4-fs (loop5): corrupt root inode, run e2fsck
[  724.549044][ T6384] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  724.557479][ T6360] EXT4-fs error (device loop2): ext4_orphan_get:1252: comm syz-executor.2: bad orphan inode 136773
[  724.575159][ T6371] EXT4-fs (loop5): mount failed
[  724.600644][ T6360] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
03:42:21 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400002d000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  724.619302][ T6384] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:42:21 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f2", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9c}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  724.680642][ T6389] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  724.695058][ T6389] EXT4-fs (loop0): #clusters per group too big: 16384
03:42:21 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r1, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:21 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019020300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  724.797720][ T6395] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
03:42:22 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000044e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  724.863697][ T6395] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  724.926495][ T6395] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  724.950969][ T6395] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue
[  724.960337][ T6405] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  725.067959][ T6412] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  725.088455][ T6413] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:22 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
dup(0xffffffffffffffff)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  725.124277][ T6421] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  725.151324][ T6413] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  725.167171][ T6412] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:42:22 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019020300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  725.196147][ T6421] EXT4-fs (loop0): #clusters per group too big: 16384
[  725.214309][ T6413] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  725.225120][ T6412] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  725.234836][ T6413] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  725.250099][ T6422] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended
[  725.274670][ T6422] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  725.284758][ T6422] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
03:42:22 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000302e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  725.287618][ T6413] EXT4-fs (loop5): corrupt root inode, run e2fsck
[  725.294806][ T6422] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  725.310248][ T6413] EXT4-fs (loop5): mount failed
[  725.324463][ T6422] EXT4-fs (loop2): orphan cleanup on readonly fs
[  725.331195][ T6422] EXT4-fs error (device loop2): ext4_orphan_get:1252: comm syz-executor.2: bad orphan inode 136882
[  725.350396][ T6422] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
03:42:22 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019030300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:22 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r1, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:22 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f2", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9c}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  725.603341][ T6444] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  725.613488][ T6444] EXT4-fs (loop0): #clusters per group too big: 16384
[  725.613533][ T6441] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  725.669481][ T6445] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  725.690116][ T6445] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
03:42:22 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000303e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  725.724384][ T6445] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  725.737921][ T6445] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  725.777463][ T6452] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  725.806312][ T6445] EXT4-fs (loop1): orphan cleanup on readonly fs
[  725.821666][ T6445] EXT4-fs error (device loop1): ext4_orphan_get:1252: comm syz-executor.1: bad orphan inode 136048
[  725.839541][ T6461] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended
[  725.850864][ T6460] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended
[  725.855043][ T6445] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue
[  725.869297][ T6452] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:42:23 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019030300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  725.893434][ T6452] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  725.902698][ T6461] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  725.915193][ T6460] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  725.947101][ T6460] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  725.957351][ T6461] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  725.967756][ T6460] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  725.999063][ T6461] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock
03:42:23 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:23 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019040300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  726.063444][ T6461] EXT4-fs (loop5): corrupt root inode, run e2fsck
[  726.079092][ T6475] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  726.111308][ T6461] EXT4-fs (loop5): mount failed
[  726.132189][ T6475] EXT4-fs (loop0): #clusters per group too big: 16384
[  726.152722][ T6460] EXT4-fs (loop2): orphan cleanup on readonly fs
[  726.161061][ T6460] EXT4-fs error (device loop2): ext4_orphan_get:1252: comm syz-executor.2: bad orphan inode 136099
[  726.184224][ T6460] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  726.301064][ T6479] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:42:23 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000304e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:23 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, 0x0)
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:23 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240))
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r1, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  726.418123][ T6489] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  726.488252][ T6489] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  726.503099][ T6496] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:23 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019040300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  726.542359][ T6496] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  726.552264][ T6489] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  726.563198][ T6496] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  726.573319][ T6496] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  726.602802][ T6496] EXT4-fs (loop1): orphan cleanup on readonly fs
[  726.612149][ T6496] EXT4-fs error (device loop1): ext4_orphan_get:1252: comm syz-executor.1: bad orphan inode 136998
[  726.623968][ T6496] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue
[  726.659644][ T6504] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  726.694506][ T6504] EXT4-fs (loop0): #clusters per group too big: 16384
03:42:23 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019050300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:23 executing program 1:
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:23 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000305e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  726.795687][ T6506] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  726.828030][ T6506] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  726.844794][ T6506] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  726.876710][ T6512] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended
[  726.886082][ T6506] EXT4-fs (loop5): mounting with "discard" option, but the device does not support discard
[  726.925968][ T6515] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  726.976102][ T6512] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  727.012813][ T6506] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue
[  727.021678][ T6512] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  727.054772][ T6512] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  727.112572][ T6532] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  727.124816][ T6530] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  727.131117][ T6534] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:24 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019050300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:24 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, 0x0)
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  727.172502][ T6532] EXT4-fs (loop0): #clusters per group too big: 16384
[  727.189439][ T6512] EXT4-fs (loop2): orphan cleanup on readonly fs
[  727.191438][ T6534] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  727.204580][ T6530] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  727.236254][ T6512] EXT4-fs error (device loop2): ext4_orphan_get:1252: comm syz-executor.2: bad orphan inode 137267
[  727.249185][ T6530] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  727.276069][ T6534] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
03:42:24 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000306e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  727.301486][ T6512] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  727.305417][ T6534] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  727.339405][ T6534] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
[  727.365022][ T6534] EXT4-fs (loop1): get root inode failed
[  727.370941][ T6534] EXT4-fs (loop1): mount failed
03:42:24 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240))
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r1, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:24 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019060300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  727.479785][ T6548] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:42:24 executing program 1:
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  727.675243][ T6556] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  727.682740][ T6559] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:24 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019060300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  727.719108][ T6559] EXT4-fs (loop0): #clusters per group too big: 16384
[  727.787589][ T6556] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
03:42:25 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000307e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  727.864047][ T6571] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  727.913718][ T6569] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  727.914878][ T6556] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  727.928272][ T6573] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended
[  727.966054][ T6571] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  727.991201][ T6569] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  728.029257][ T6571] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  728.045801][ T6579] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  728.063778][ T6573] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  728.074838][ T6556] EXT4-fs (loop5): mounting with "discard" option, but the device does not support discard
[  728.079594][ T6569] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  728.093505][ T6571] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  728.103801][ T6556] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue
[  728.104483][ T6573] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  728.130269][ T6573] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  728.140406][ T6571] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
[  728.154719][ T6571] EXT4-fs (loop1): get root inode failed
[  728.161425][ T6571] EXT4-fs (loop1): mount failed
[  728.167249][ T6573] EXT4-fs (loop2): orphan cleanup on readonly fs
03:42:25 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, 0x0)
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  728.178171][ T6573] EXT4-fs error (device loop2): ext4_orphan_get:1252: comm syz-executor.2: bad orphan inode 137160
[  728.192405][ T6573] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  728.226696][ T6590] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  728.245765][ T6590] EXT4-fs (loop0): #clusters per group too big: 16384
03:42:25 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240))
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r1, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:25 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019070300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:25 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019070300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:25 executing program 1:
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:25 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000308e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  728.627195][ T6609] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  728.653889][ T6606] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  728.665462][ T6610] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended
[  728.685551][ T6609] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  728.713700][ T6618] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  728.724115][ T6610] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  728.737302][ T6609] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  728.743054][ T6618] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  728.748680][ T6610] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  728.760792][ T6618] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  728.774267][ T6609] EXT4-fs (loop5): mounting with "discard" option, but the device does not support discard
[  728.777964][ T6610] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  728.785394][ T6609] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue
[  728.805102][ T6620] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  728.819234][ T6620] EXT4-fs (loop0): #clusters per group too big: 16384
[  728.841357][ T6619] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  728.854962][ T6610] EXT4-fs (loop2): orphan cleanup on readonly fs
03:42:26 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  728.884566][ T6610] EXT4-fs error (device loop2): ext4_orphan_get:1252: comm syz-executor.2: bad orphan inode 137468
[  728.901752][ T6619] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
03:42:26 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019080300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  728.951902][ T6619] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  728.962116][ T6619] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  728.972636][ T6610] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
03:42:26 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019080300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:26 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000309e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  729.017756][ T6619] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
[  729.056388][ T6619] EXT4-fs (loop1): get root inode failed
[  729.112586][ T6619] EXT4-fs (loop1): mount failed
03:42:26 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r1 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r1, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  729.235954][ T6645] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  729.255409][ T6645] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  729.264254][ T6645] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  729.290427][ T6644] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  729.312154][ T6649] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  729.345708][ T6644] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  729.359106][ T6644] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock
03:42:26 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:26 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019090300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  729.386615][ T6652] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  729.424024][ T6644] EXT4-fs (loop5): mounting with "discard" option, but the device does not support discard
[  729.426533][ T6652] EXT4-fs (loop0): #clusters per group too big: 16384
[  729.462589][ T6663] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended
[  729.477488][ T6644] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue
03:42:26 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019090300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  729.551642][ T6663] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
03:42:26 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  729.598974][ T6663] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  729.667308][ T6663] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  729.706437][ T6663] EXT4-fs (loop2): orphan cleanup on readonly fs
[  729.712911][ T6663] EXT4-fs error (device loop2): ext4_orphan_get:1252: comm syz-executor.2: bad orphan inode 138377
[  729.724593][ T6663] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  729.776436][ T6671] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  729.785974][ T6675] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  729.808474][ T6678] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:42:27 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900030ae60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  729.836100][ T6675] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  729.844559][ T6671] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
03:42:27 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r1 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r1, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  729.878954][ T6675] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  729.896779][ T6671] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  729.914852][ T6671] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
03:42:27 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="8000000038040000190a0300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  729.941173][ T6671] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
[  729.957926][ T6671] EXT4-fs (loop1): get root inode failed
[  729.967355][ T6671] EXT4-fs (loop1): mount failed
03:42:27 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="8000000038040000190a0300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:27 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  730.125048][ T6688] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  730.163033][ T6688] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  730.204135][ T6688] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  730.227991][ T6688] EXT4-fs (loop5): mounting with "discard" option, but the device does not support discard
[  730.244250][ T6705] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  730.253747][ T6700] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  730.278628][ T6705] EXT4-fs (loop0): #clusters per group too big: 16384
[  730.294191][ T6688] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue
[  730.308362][ T6700] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  730.324335][ T6700] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:42:27 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900030be60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:27 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  730.450041][ T6716] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  730.459602][ T6706] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended
[  730.480999][ T6715] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:42:27 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="8000000038040000190b0300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  730.550674][ T6716] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  730.562455][ T6706] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  730.596482][ T6716] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  730.606506][ T6706] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  730.687116][ T6727] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  730.692453][ T6716] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  730.717983][ T6706] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  730.741954][ T6730] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  730.760143][ T6727] EXT4-fs (loop0): #clusters per group too big: 16384
[  730.776001][ T6716] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
03:42:27 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="8000000038040000190b0300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  730.777677][ T6730] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  730.798775][ T6706] EXT4-fs (loop2): orphan cleanup on readonly fs
[  730.799261][ T6716] EXT4-fs (loop1): get root inode failed
[  730.812930][ T6716] EXT4-fs (loop1): mount failed
[  730.814207][ T6706] EXT4-fs error (device loop2): ext4_orphan_get:1252: comm syz-executor.2: bad orphan inode 137677
[  730.839147][ T6730] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  730.855778][ T6730] EXT4-fs (loop5): mounting with "discard" option, but the device does not support discard
[  730.864400][ T6706] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  730.866964][ T6730] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue
[  730.961859][ T6734] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:28 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900030ce60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:28 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:28 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r1 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r1, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  731.039717][ T6734] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:42:28 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, 0x0, 0x0)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  731.107676][ T6734] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  731.285686][ T6755] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  731.318402][ T6759] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  731.328125][ T6751] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:42:28 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="8000000038040000190c0300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  731.372241][ T6755] EXT4-fs (loop0): #clusters per group too big: 16384
[  731.393212][ T6759] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  731.409060][ T6759] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  731.419500][ T6759] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  731.462041][ T6771] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  731.503382][ T6770] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended
[  731.518219][ T6759] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
[  731.518751][ T6771] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
03:42:28 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900030de60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  731.559310][ T6759] EXT4-fs (loop1): get root inode failed
[  731.566960][ T6759] EXT4-fs (loop1): mount failed
03:42:28 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="8000000038040000190c0300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  731.608126][ T6770] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  731.617668][ T6771] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  731.620395][ T6770] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  731.638030][ T6770] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  731.658217][ T6771] EXT4-fs (loop5): mounting with "discard" option, but the device does not support discard
[  731.671369][ T6770] EXT4-fs (loop2): orphan cleanup on readonly fs
03:42:28 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, 0x0}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  731.716413][ T6770] EXT4-fs error (device loop2): ext4_orphan_get:1252: comm syz-executor.2: bad orphan inode 138540
[  731.723583][ T6771] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue
[  731.755862][ T6777] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  731.798324][ T6770] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  731.820274][ T6777] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:42:29 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, 0x0, 0x0)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  731.848539][ T6791] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:42:29 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  731.912468][ T6777] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:42:29 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="8000000038040000190d0300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  732.052043][ T6793] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  732.069007][ T6793] EXT4-fs (loop0): #clusters per group too big: 16384
[  732.116331][ T6800] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:29 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="8000000038040000190d0300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:29 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900030ee60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  732.189832][ T6800] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  732.273797][ T6800] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  732.289408][ T6811] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  732.326976][ T6800] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  732.351378][ T6800] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
[  732.364605][ T6800] EXT4-fs (loop1): get root inode failed
[  732.389171][ T6815] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  732.429126][ T6814] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended
[  732.441080][ T6800] EXT4-fs (loop1): mount failed
[  732.446131][ T6815] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  732.477799][ T6815] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock
03:42:29 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="8000000038040000190e0300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  732.493203][ T6814] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  732.509179][ T6814] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  732.520210][ T6815] EXT4-fs (loop5): mounting with "discard" option, but the device does not support discard
[  732.532806][ T6824] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  732.562634][ T6830] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  732.575346][ T6824] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  732.585193][ T6815] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue
[  732.595874][ T6814] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock
03:42:29 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, 0x0}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  732.618416][ T6830] EXT4-fs (loop0): #clusters per group too big: 16384
[  732.627879][ T6824] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  732.636868][ T6814] EXT4-fs (loop2): orphan cleanup on readonly fs
[  732.674444][ T6814] EXT4-fs error (device loop2): ext4_orphan_get:1252: comm syz-executor.2: bad orphan inode 137934
03:42:29 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, 0x0, 0x0)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:29 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000310e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:29 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="8000000038040000190e0300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  732.726884][ T6814] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
03:42:29 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  732.798750][ T6841] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:42:30 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019100300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  733.029625][ T6853] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  733.044683][ T6846] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  733.060284][ T6846] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  733.069008][ T6853] EXT4-fs (loop0): #clusters per group too big: 16384
[  733.081641][ T6856] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  733.105331][ T6846] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  733.116067][ T6856] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  733.125092][ T6846] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  733.135787][ T6856] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  733.159418][ T6846] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
[  733.171624][ T6857] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  733.185076][ T6857] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  733.197400][ T6846] EXT4-fs (loop1): get root inode failed
[  733.213127][ T6857] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  733.222371][ T6846] EXT4-fs (loop1): mount failed
[  733.265562][ T6857] EXT4-fs (loop5): mounting with "discard" option, but the device does not support discard
[  733.293820][ T6868] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:30 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, 0x0}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  733.351580][ T6868] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
03:42:30 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019100300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:30 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000311e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  733.394651][ T6876] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  733.405118][ T6857] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue
[  733.421746][ T6868] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  733.492507][ T6868] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock
03:42:30 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  733.586204][ T6868] EXT4-fs (loop2): orphan cleanup on readonly fs
[  733.605602][ T6868] EXT4-fs error (device loop2): ext4_orphan_get:1252: comm syz-executor.2: bad orphan inode 138770
03:42:30 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019110300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  733.647601][ T6886] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  733.656538][ T6868] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  733.667097][ T6886] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  733.691744][ T6890] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  733.707349][ T6886] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  733.716353][ T6890] EXT4-fs (loop0): #clusters per group too big: 16384
03:42:30 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000312e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  733.746363][ T6891] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  733.762182][ T6891] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  733.783507][ T6891] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
03:42:30 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  733.834811][ T6891] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
03:42:31 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019110300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  733.937809][ T6905] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  733.947652][ T6891] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
[  733.994102][ T6891] EXT4-fs (loop1): get root inode failed
[  734.013991][ T6891] EXT4-fs (loop1): mount failed
[  734.145233][ T6916] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended
[  734.145238][ T6914] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  734.145252][ T6914] EXT4-fs (loop0): #clusters per group too big: 16384
[  734.176520][ T6917] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:31 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  734.203012][ T6916] EXT4-fs (loop5): bad geometry: block count 34359739448 exceeds size of device (66048 blocks)
03:42:31 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019120300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  734.255991][ T6917] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  734.271721][ T6917] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  734.287725][ T6917] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  734.315104][ T6917] EXT4-fs (loop2): orphan cleanup on readonly fs
[  734.322271][ T6917] EXT4-fs error (device loop2): ext4_orphan_get:1252: comm syz-executor.2: bad orphan inode 138112
[  734.333737][ T6917] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  734.357080][ T6925] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  734.366521][ T6925] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  734.375187][ T6925] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:42:31 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:31 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000325e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:31 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, 0x0)
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:31 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019120300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  734.544063][ T6938] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  734.734977][ T6940] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  734.774935][ T6940] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  734.804028][ T6948] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended
[  734.821328][ T6949] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  734.827684][ T6940] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
03:42:32 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019250300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  734.873938][ T6940] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  734.887798][ T6954] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  734.916851][ T6958] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  734.917655][ T6948] EXT4-fs (loop5): bad geometry: block count 34359739448 exceeds size of device (66048 blocks)
[  734.939337][ T6949] EXT4-fs (loop0): #clusters per group too big: 16384
[  734.952029][ T6940] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
[  734.952720][ T6954] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  734.970935][ T6958] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  734.984486][ T6954] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  734.992030][ T6940] EXT4-fs (loop1): get root inode failed
03:42:32 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900032de60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  735.026751][ T6958] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  735.042147][ T6940] EXT4-fs (loop1): mount failed
[  735.072850][ T6958] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  735.208307][ T6972] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  735.235481][ T6977] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:32 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:32 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019250300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:32 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, 0x0)
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:32 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  735.264788][ T6977] EXT4-fs (loop0): #clusters per group too big: 16384
03:42:32 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="8000000038040000192d0300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:32 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900032fe60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  735.477595][ T6987] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  735.538020][ T6987] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  735.580772][ T6995] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended
[  735.605104][ T6987] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  735.633809][ T6995] EXT4-fs (loop5): bad geometry: block count 34359739448 exceeds size of device (66048 blocks)
[  735.640086][ T6987] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  735.669599][ T6987] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
03:42:32 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  735.699511][ T6987] EXT4-fs (loop1): get root inode failed
[  735.713670][ T7002] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  735.719061][ T6999] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  735.727658][ T6987] EXT4-fs (loop1): mount failed
[  735.770404][ T6999] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  735.779516][ T6999] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  735.790417][ T7001] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  735.809492][ T7001] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  735.820069][ T7001] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  735.832090][ T7001] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  735.889658][ T7010] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  735.899535][ T7010] EXT4-fs (loop0): #clusters per group too big: 16384
03:42:33 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:33 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, 0x0)
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:33 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019480300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:33 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="8000000038040000192d0300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:33 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000348e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  736.216509][ T7025] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended
[  736.272777][ T7029] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  736.306921][ T7025] EXT4-fs (loop5): bad geometry: block count 34359739448 exceeds size of device (66048 blocks)
[  736.318464][ T7036] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  736.338505][ T7036] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  736.353244][ T7036] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  736.365507][ T7034] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  736.382094][ T7034] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  736.403424][ T7034] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
03:42:33 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="8000000038040000194c0300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  736.425453][ T7034] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  736.460638][ T7034] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
03:42:33 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  736.495289][ T7034] EXT4-fs (loop1): get root inode failed
[  736.523153][ T7034] EXT4-fs (loop1): mount failed
[  736.524582][ T7041] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
03:42:33 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="8000000038040000192f0300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  736.549470][ T7044] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  736.560696][ T7041] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  736.572000][ T7044] EXT4-fs (loop0): #clusters per group too big: 16384
03:42:33 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245"], 0x16}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  736.623253][ T7041] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  736.658664][ T7041] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
03:42:33 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900034ce60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:34 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  736.856646][ T7061] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  736.991017][ T7072] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  736.992251][ T7070] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended
[  737.014334][ T7072] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  737.028801][ T7072] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  737.039263][ T7072] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  737.064738][ T7073] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  737.090626][ T7070] EXT4-fs (loop5): bad geometry: block count 34359739448 exceeds size of device (66048 blocks)
[  737.104476][ T7079] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:34 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="8000000038040000195c0300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  737.146163][ T7072] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
[  737.159035][ T7073] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  737.180856][ T7073] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  737.189438][ T7079] EXT4-fs (loop0): #clusters per group too big: 16384
03:42:34 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  737.204442][ T7072] EXT4-fs (loop1): get root inode failed
[  737.221423][ T7072] EXT4-fs (loop1): mount failed
03:42:34 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019480300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:34 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900035ce60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:34 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245"], 0x16}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  737.417730][ T7093] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  737.474027][ T7093] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  737.504285][ T7093] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  737.514397][ T7101] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended
[  737.527209][ T7100] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  737.564111][ T7101] EXT4-fs (loop5): bad geometry: block count 34359739448 exceeds size of device (66048 blocks)
[  737.579601][ T7093] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
03:42:34 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:34 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019600300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  737.677260][ T7110] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  737.711788][ T7110] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:42:34 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  737.762481][ T7117] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  737.764840][ T7110] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  737.826568][ T7117] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  737.838798][ T7120] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:35 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="8000000038040000194c0300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  737.873583][ T7120] EXT4-fs (loop0): #clusters per group too big: 16384
[  737.909358][ T7117] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  737.944931][ T7117] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  737.970993][ T7117] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
[  737.987710][ T7117] EXT4-fs (loop1): get root inode failed
[  737.994082][ T7117] EXT4-fs (loop1): mount failed
03:42:35 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000360e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  738.099367][ T7129] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  738.125396][ T7131] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended
[  738.158171][ T7139] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  738.178702][ T7131] EXT4-fs (loop5): bad geometry: block count 34359739448 exceeds size of device (66048 blocks)
03:42:35 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245"], 0x16}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  738.211544][ T7139] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  738.229249][ T7139] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  738.251908][ T7139] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  738.328268][ T7145] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  738.355120][ T7145] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:42:35 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:35 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:35 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019680300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  738.396529][ T7151] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  738.414281][ T7151] EXT4-fs (loop0): #clusters per group too big: 16384
[  738.421227][ T7145] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:42:35 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000368e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  738.643922][ T7159] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  738.681693][ T7159] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
03:42:35 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="8000000038040000195c0300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  738.735584][ T7159] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  738.768950][ T7159] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  738.801372][ T7159] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
[  738.851488][ T7167] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended
[  738.894030][ T7174] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  738.908167][ T7167] EXT4-fs (loop5): bad geometry: block count 34359739448 exceeds size of device (66048 blocks)
[  738.950683][ T7159] EXT4-fs (loop1): get root inode failed
[  738.976622][ T7159] EXT4-fs (loop1): mount failed
[  739.025546][ T7184] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  739.035541][ T7176] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  739.053584][ T7184] EXT4-fs (loop0): #clusters per group too big: 16384
[  739.060676][ T7176] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  739.071626][ T7176] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  739.092417][ T7176] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  739.122662][ T7186] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:36 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB], 0x16}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:36 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:36 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="8000000038040000196c0300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:36 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900036ce60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:36 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, 0x0, 0x0)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  739.213422][ T7186] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  739.260013][ T7186] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:42:36 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019600300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  739.438999][ T7201] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  739.491809][ T7201] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  739.502551][ T7201] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  739.512648][ T7201] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  739.536949][ T7201] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
[  739.549700][ T7201] EXT4-fs (loop1): get root inode failed
[  739.555664][ T7201] EXT4-fs (loop1): mount failed
[  739.610526][ T7206] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  739.622990][ T7215] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended
[  739.627955][ T7214] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  739.651276][ T7206] EXT4-fs (loop0): #clusters per group too big: 16384
03:42:36 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB], 0x16}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  739.658786][ T7215] EXT4-fs (loop5): bad geometry: block count 34359739448 exceeds size of device (66048 blocks)
[  739.692068][ T7216] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
03:42:36 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000374e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  739.754068][ T7216] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
03:42:36 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019740300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:37 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x5, 0x0)

[  739.794678][ T7216] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  739.854597][ T7228] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  739.868513][ T7216] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  739.923223][ T7228] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:42:37 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, 0x0, 0x0)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  739.975658][ T7228] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  740.094167][ T7235] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  740.104293][ T7235] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  740.114401][ T7235] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  740.124717][ T7235] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  740.145261][ T7235] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
[  740.159062][ T7240] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  740.168625][ T7235] EXT4-fs (loop1): get root inode failed
[  740.175805][ T7235] EXT4-fs (loop1): mount failed
03:42:37 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x5, 0x0)

[  740.223564][ T7244] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:37 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB], 0x16}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  740.271598][ T7244] EXT4-fs (loop0): #clusters per group too big: 16384
03:42:37 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019680300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:37 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="8000000038040000197a0300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:37 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900037ae60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  740.457612][ T7261] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  740.467803][ T7261] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  740.477787][ T7261] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  740.535411][ T7261] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  740.564301][ T7268] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  740.636815][ T7268] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  740.668552][ T7268] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
03:42:37 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, 0x0, 0x0)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:37 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x5, 0x0)

[  740.708437][ T7283] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  740.734671][ T7268] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  740.760464][ T7284] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  740.792008][ T7284] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  740.795866][ T7283] EXT4-fs (loop0): #clusters per group too big: 16384
[  740.800636][ T7284] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  740.819136][ T7268] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
[  740.844385][ T7282] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:42:38 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60200006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  740.857968][ T7268] EXT4-fs (loop1): get root inode failed
[  740.876557][ T7268] EXT4-fs (loop1): mount failed
[  741.083283][ T7299] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  741.112252][ T7299] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
03:42:38 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="8000000038040000197d0300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  741.125318][ T7299] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  741.146689][ T7299] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
03:42:38 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285b"], 0x5a}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:38 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="8000000038040000196c0300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:38 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x5, 0x0)

[  741.176960][ T7308] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:38 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  741.240349][ T7308] EXT4-fs (loop0): #clusters per group too big: 16384
03:42:38 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60300006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  741.331851][ T7317] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:42:38 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x5, 0x0)

[  741.557558][ T7327] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:38 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000500e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  741.608571][ T7329] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  741.630906][ T7327] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  741.657014][ T7329] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  741.671678][ T7327] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  741.677493][ T7336] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended
[  741.715008][ T7329] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  741.750407][ T7336] EXT4-fs (loop2): bad geometry: block count 34359739448 exceeds size of device (66048 blocks)
[  741.781478][ T7329] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  741.801274][ T7343] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  741.819804][ T7343] EXT4-fs (loop0): #clusters per group too big: 16384
03:42:39 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019740300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:39 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60400006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  741.858729][ T7329] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
[  741.873761][ T7329] EXT4-fs (loop1): get root inode failed
[  741.887902][ T7329] EXT4-fs (loop1): mount failed
[  742.019689][ T7354] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:42:39 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:39 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x5, 0x0)

03:42:39 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285b"], 0x5a}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:39 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000600e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  742.304518][ T7364] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  742.350838][ T7370] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  742.369229][ T7364] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:42:39 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60500006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  742.396738][ T7370] EXT4-fs (loop0): #clusters per group too big: 16384
[  742.414059][ T7364] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:42:39 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x5, 0x0)

03:42:39 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="8000000038040000197a0300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  742.520834][ T7381] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended
[  742.532181][ T7381] EXT4-fs (loop2): bad geometry: block count 34359739448 exceeds size of device (66048 blocks)
[  742.573850][ T7389] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  742.583833][ T7384] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  742.593829][ T7384] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  742.624284][ T7384] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
03:42:39 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  742.666516][ T7384] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  742.698796][ T7403] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
[  742.724169][ T7384] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
[  742.760653][ T7384] EXT4-fs (loop1): get root inode failed
03:42:39 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x5, 0x0)

[  742.774836][ T7384] EXT4-fs (loop1): mount failed
03:42:40 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285b"], 0x5a}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  742.879136][ T7404] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  742.888621][ T7405] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:40 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000700e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  742.933536][ T7404] EXT4-fs (loop0): #clusters per group too big: 16384
[  742.952540][ T7405] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  742.975068][ T7405] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  743.095028][ T7417] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended
[  743.105226][ T7421] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
03:42:40 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60600006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:40 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000500e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  743.174572][ T7417] EXT4-fs (loop2): bad geometry: block count 34359739448 exceeds size of device (66048 blocks)
[  743.251312][ T7428] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  743.260833][ T7433] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:42:40 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x5, 0x0)

03:42:40 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  743.375255][ T7428] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
03:42:40 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000900e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  743.439032][ T7428] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  743.459478][ T7428] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  743.524878][ T7428] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
[  743.547419][ T7443] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  743.566150][ T7452] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
[  743.577467][ T7428] EXT4-fs (loop1): get root inode failed
[  743.600306][ T7428] EXT4-fs (loop1): mount failed
[  743.604831][ T7443] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  743.619954][ T7443] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  743.636098][ T7446] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:40 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x5, 0x0)

[  743.677376][ T7446] EXT4-fs (loop0): #clusters per group too big: 16384
03:42:40 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60700006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  743.782514][ T7451] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended
[  743.792159][ T7461] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  743.809484][ T7451] EXT4-fs (loop2): bad geometry: block count 34359739448 exceeds size of device (66048 blocks)
03:42:41 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1"], 0x7c}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:41 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000600e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:41 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  743.971459][ T7473] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
03:42:41 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000a00e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:41 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x5, 0x0)

[  744.153024][ T7479] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  744.225795][ T7484] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  744.237892][ T7486] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  744.252818][ T7479] EXT4-fs (loop0): #clusters per group too big: 16384
[  744.265563][ T7484] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  744.299932][ T7486] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  744.308139][ T7486] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  744.311695][ T7484] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  744.320837][ T7491] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended
[  744.345105][ T7491] EXT4-fs (loop2): bad geometry: block count 34359739448 exceeds size of device (66048 blocks)
[  744.348627][ T7484] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  744.370925][ T7484] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
03:42:41 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60a00006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  744.409630][ T7484] EXT4-fs (loop1): get root inode failed
[  744.433971][ T7484] EXT4-fs (loop1): mount failed
03:42:41 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000700e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  744.477414][ T7501] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
[  744.489804][ T7492] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:42:41 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  744.667719][ T7511] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:41 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x5, 0x0)

03:42:41 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1"], 0x7c}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  744.712271][ T7515] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  744.741633][ T7511] EXT4-fs (loop0): #clusters per group too big: 16384
[  744.748704][ T7515] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:42:41 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000b00e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  744.791453][ T7515] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:42:42 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60b00006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:42 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000900e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  744.915550][ T7519] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended
[  744.925038][ T7525] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
[  744.980260][ T7519] EXT4-fs (loop2): bad geometry: block count 34359739448 exceeds size of device (66048 blocks)
03:42:42 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x400}], 0x5, 0x0)

[  745.079805][ T7531] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  745.130922][ T7531] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  745.141130][ T7531] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  745.151289][ T7531] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  745.163898][ T7531] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
[  745.176749][ T7531] EXT4-fs (loop1): get root inode failed
[  745.183085][ T7531] EXT4-fs (loop1): mount failed
03:42:42 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  745.258129][ T7547] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  745.267743][ T7541] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:42:42 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1"], 0x7c}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  745.299065][ T7547] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  745.317715][ T7539] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  745.344280][ T7547] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  745.348766][ T7539] EXT4-fs (loop0): #clusters per group too big: 16384
03:42:42 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000a00e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  745.418371][ T7557] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
03:42:42 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000c00e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:42 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x400}], 0x5, 0x0)

03:42:42 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60c00006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  745.536075][ T7559] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended
[  745.555059][ T7559] EXT4-fs (loop2): bad geometry: block count 34359739448 exceeds size of device (66048 blocks)
03:42:42 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  745.754428][ T7567] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  745.767865][ T7567] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  745.798569][ T7567] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  745.814875][ T7567] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  745.836103][ T7567] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
[  745.853774][ T7583] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
[  745.867219][ T7580] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  745.871399][ T7572] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  745.889433][ T7582] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  745.910561][ T7567] EXT4-fs (loop1): get root inode failed
[  745.929568][ T7582] EXT4-fs (loop0): #clusters per group too big: 16384
[  745.939204][ T7567] EXT4-fs (loop1): mount failed
[  745.944187][ T7572] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:42:43 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x400}], 0x5, 0x0)

[  745.960850][ T7572] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:42:43 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f"], 0x8d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  746.189519][ T7595] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:43 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000d00e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:43 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000b00e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:43 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60d00006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  746.258312][ T7595] EXT4-fs (loop2): bad geometry: block count 34359739448 exceeds size of device (66048 blocks)
[  746.287776][ T7605] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
03:42:43 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040), 0x0, 0x400}], 0x5, 0x0)

03:42:43 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  746.539136][ T7612] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  746.590658][ T7616] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  746.600004][ T7623] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  746.619842][ T7616] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  746.628564][ T7612] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  746.639079][ T7623] EXT4-fs (loop0): #clusters per group too big: 16384
[  746.647243][ T7621] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  746.658487][ T7634] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
[  746.684156][ T7616] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  746.699913][ T7612] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  746.717355][ T7612] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
03:42:43 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60f00006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  746.727751][ T7612] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
[  746.740461][ T7612] EXT4-fs (loop1): get root inode failed
[  746.746267][ T7612] EXT4-fs (loop1): mount failed
03:42:43 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000c00e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:44 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040), 0x0, 0x400}], 0x5, 0x0)

03:42:44 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f"], 0x8d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  747.009028][ T7637] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:44 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000e00e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  747.105134][ T7637] EXT4-fs (loop2): bad geometry: block count 34359739448 exceeds size of device (66048 blocks)
03:42:44 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000d00e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:44 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x5, 0x0)

[  747.280102][ T7656] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
[  747.286789][ T7654] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  747.320406][ T7663] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  747.323417][ T7654] EXT4-fs (loop0): #clusters per group too big: 16384
03:42:44 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040), 0x0, 0x400}], 0x5, 0x0)

[  747.433978][ T7664] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  747.467081][ T7664] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
03:42:44 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e61400006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:44 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019001100e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  747.509202][ T7664] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  747.543786][ T7676] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  747.614179][ T7664] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
03:42:44 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x5, 0x0)

[  747.655946][ T7676] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  747.673931][ T7676] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  747.688792][ T7664] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
[  747.705737][ T7664] EXT4-fs (loop1): get root inode failed
[  747.712295][ T7664] EXT4-fs (loop1): mount failed
[  747.823723][ T7695] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
[  747.846893][ T7693] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:45 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000e00e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:45 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f"], 0x8d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  747.871106][ T7697] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  747.908197][ T7693] EXT4-fs (loop0): #clusters per group too big: 16384
03:42:45 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x5, 0x0)

03:42:45 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001", 0x1d, 0x400}], 0x5, 0x0)

03:42:45 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e62500006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:45 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019001200e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  748.218713][ T7720] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  748.258592][ T7737] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
[  748.264221][ T7720] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  748.306523][ T7720] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  748.328586][ T7723] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  748.343341][ T7723] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  748.349285][ T7720] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  748.353483][ T7723] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  748.372358][ T7720] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
[  748.395700][ T7720] EXT4-fs (loop1): get root inode failed
[  748.403218][ T7720] EXT4-fs (loop1): mount failed
03:42:45 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019001100e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:45 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001", 0x1d, 0x400}], 0x5, 0x0)

03:42:45 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x5, 0x0)

[  748.496474][ T7738] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  748.556030][ T7735] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:45 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e41"], 0x95}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  748.610048][ T7735] EXT4-fs (loop0): #clusters per group too big: 16384
03:42:45 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019002300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  748.704890][ T7758] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
03:42:45 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x5, 0x0)

03:42:46 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e62d00006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  748.864140][ T7757] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:46 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001", 0x1d, 0x400}], 0x5, 0x0)

[  748.909067][ T7757] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  748.943802][ T7757] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  748.963680][ T7769] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  748.998482][ T7769] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  749.018699][ T7769] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  749.034423][ T7772] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  749.034560][ T7769] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  749.057463][ T7769] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
[  749.070961][ T7769] EXT4-fs (loop1): get root inode failed
[  749.076819][ T7769] EXT4-fs (loop1): mount failed
03:42:46 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x5, 0x0)

03:42:46 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e41"], 0x95}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:46 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019001200e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  749.208156][ T7787] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  749.230096][ T7787] EXT4-fs (loop0): #clusters per group too big: 16384
03:42:46 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019002d00e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  749.302868][ T7795] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
03:42:46 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e62f00006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:46 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000", 0x2c, 0x400}], 0x5, 0x0)

[  749.483476][ T7809] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  749.517021][ T7809] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
03:42:46 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x5, 0x0)

[  749.552817][ T7810] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  749.602635][ T7809] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  749.613537][ T7810] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  749.655963][ T7810] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  749.676737][ T7809] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  749.691128][ T7815] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:42:46 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019002300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  749.717937][ T7809] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
[  749.758618][ T7809] EXT4-fs (loop1): get root inode failed
[  749.770748][ T7829] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
[  749.777605][ T7830] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[  749.809099][ T7809] EXT4-fs (loop1): mount failed
03:42:47 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019003f00e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:47 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x5, 0x0)

[  749.842960][ T7823] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  749.875725][ T7823] EXT4-fs (loop0): #clusters per group too big: 16384
03:42:47 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000", 0x2c, 0x400}], 0x5, 0x0)

03:42:47 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e66400006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:47 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e41"], 0x95}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  750.055353][ T7844] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  750.110710][ T7844] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  750.144959][ T7844] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  750.176785][ T7854] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
03:42:47 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019002d00e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  750.235945][ T7849] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  750.300029][ T7863] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
03:42:47 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000", 0x2c, 0x400}], 0x5, 0x0)

03:42:47 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x5, 0x0)

[  750.400306][ T7869] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  750.433122][ T7869] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  750.450234][ T7872] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:47 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019004000e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  750.525323][ T7869] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  750.528650][ T7872] EXT4-fs (loop0): #clusters per group too big: 16384
[  750.548975][ T7869] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
03:42:47 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60003006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  750.584666][ T7869] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
[  750.613688][ T7869] EXT4-fs (loop1): get root inode failed
[  750.621249][ T7869] EXT4-fs (loop1): mount failed
[  750.660102][ T7890] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[  750.681077][ T7891] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
[  750.736913][ T7885] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  750.752731][ T7885] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  750.761667][ T7885] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:42:48 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x5, 0x0)

[  750.803460][ T7902] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:42:48 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019002f00e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:48 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe", 0x33, 0x400}], 0x5, 0x0)

03:42:48 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8d"], 0x99}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  750.996387][ T7909] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  751.009002][ T7909] EXT4-fs (loop0): #clusters per group too big: 16384
03:42:48 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001901b400e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  751.096042][ T7919] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[  751.103823][ T7922] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
03:42:48 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e66003006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:48 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x5, 0x0)

[  751.199143][ T7920] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:48 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe", 0x33, 0x400}], 0x5, 0x0)

[  751.250611][ T7928] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  751.266413][ T7920] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  751.342549][ T7920] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  751.365006][ T7928] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  751.388923][ T7928] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  751.400093][ T7928] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  751.425373][ T7928] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
03:42:48 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019004000e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  751.449973][ T7928] EXT4-fs (loop1): get root inode failed
[  751.461919][ T7928] EXT4-fs (loop1): mount failed
[  751.488645][ T7947] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
[  751.489988][ T7946] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[  751.527421][ T7943] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  751.585337][ T7945] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  751.597615][ T7945] EXT4-fs (loop0): #clusters per group too big: 16384
03:42:48 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe", 0x33, 0x400}], 0x5, 0x0)

03:42:48 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8d"], 0x99}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  751.724275][ T7968] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:48 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x5, 0x0)

03:42:48 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e68103006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  751.798301][ T7968] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:42:49 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001903c000e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  751.865506][ T7985] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
[  751.873163][ T7968] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:42:49 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001903c000e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:49 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ff", 0x37, 0x400}], 0x5, 0x0)

[  752.026618][ T7995] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  752.040879][ T8000] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[  752.044378][ T7999] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  752.092962][ T7995] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  752.104267][ T7999] EXT4-fs (loop0): #clusters per group too big: 16384
[  752.110191][ T7995] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  752.121584][ T7995] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
03:42:49 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e69703006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:49 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x400}], 0x5, 0x0)

[  752.180813][ T7995] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
[  752.201562][ T8009] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  752.211890][ T7995] EXT4-fs (loop1): get root inode failed
[  752.218090][ T7995] EXT4-fs (loop1): mount failed
[  752.355874][ T8025] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
[  752.357492][ T8018] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:49 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8d"], 0x99}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:49 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="8000000038040000197fff00e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:49 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ff", 0x37, 0x400}], 0x5, 0x0)

[  752.461512][ T8037] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[  752.475161][ T8018] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  752.531605][ T8018] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:42:49 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x400}], 0x5, 0x0)

[  752.601864][ T8039] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  752.638588][ T8039] EXT4-fs (loop0): #clusters per group too big: 16384
03:42:49 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="8000000038040000197fff00e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  752.730671][ T8045] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  752.767738][ T8045] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
03:42:49 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e69b03006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  752.785762][ T8045] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  752.800393][ T8055] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
[  752.811654][ T8053] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  752.812295][ T8045] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  752.844734][ T8045] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
03:42:50 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ff", 0x37, 0x400}], 0x5, 0x0)

[  752.924839][ T8045] EXT4-fs (loop1): get root inode failed
[  752.941064][ T8064] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[  752.964539][ T8045] EXT4-fs (loop1): mount failed
03:42:50 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000200e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:50 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x400}], 0x5, 0x0)

03:42:50 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd"], 0x9b}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  753.100470][ T8071] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  753.147506][ T8082] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
[  753.155018][ T8071] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  753.163541][ T8071] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:42:50 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53", 0x39, 0x400}], 0x5, 0x0)

[  753.195555][ T8077] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:50 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000200e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  753.270127][ T8077] EXT4-fs (loop0): #clusters per group too big: 16384
[  753.320963][ T8096] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[  753.372231][ T8089] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:42:50 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e62804006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:50 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040), 0x0, 0x400}], 0x5, 0x0)

[  753.438223][ T8093] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  753.464203][ T8093] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  753.483113][ T8093] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  753.513840][ T8109] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
03:42:50 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000400e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  753.589247][ T8093] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  753.619513][ T8093] EXT4-fs (loop1): corrupt root inode, run e2fsck
[  753.629185][ T8093] EXT4-fs (loop1): mount failed
[  753.695909][ T8119] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[  753.703289][ T8111] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  753.717908][ T8120] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:50 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53", 0x39, 0x400}], 0x5, 0x0)

03:42:50 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd"], 0x9b}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  753.743801][ T8111] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  753.759133][ T8120] EXT4-fs (loop0): #clusters per group too big: 16384
[  753.764152][ T8111] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:42:50 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040), 0x0, 0x400}], 0x5, 0x0)

03:42:51 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e63404006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:51 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000400e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  753.931296][ T8134] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
[  753.954900][ T8131] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  754.129861][ T8148] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[  754.134643][ T8146] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  754.172870][ T8149] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  754.187480][ T8150] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  754.197069][ T8150] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  754.205838][ T8150] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  754.206624][ T8149] EXT4-fs (loop0): #clusters per group too big: 16384
03:42:51 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53", 0x39, 0x400}], 0x5, 0x0)

03:42:51 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000500e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  754.229380][ T8146] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  754.245572][ T8146] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
03:42:51 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e63504006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  754.286218][ T8146] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  754.302260][ T8146] EXT4-fs (loop1): corrupt root inode, run e2fsck
[  754.310943][ T8146] EXT4-fs (loop1): mount failed
03:42:51 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040), 0x0, 0x400}], 0x5, 0x0)

03:42:51 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000500e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  754.492218][ T8168] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
03:42:51 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd"], 0x9b}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  754.539557][ T8170] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:42:51 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a}], 0x5, 0x0)

[  754.646548][ T8174] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  754.659165][ T8185] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[  754.663642][ T8174] EXT4-fs (loop0): #clusters per group too big: 16384
03:42:51 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001", 0x1d, 0x400}], 0x5, 0x0)

03:42:51 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000600e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  754.758736][ T8184] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  754.797656][ T8184] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:42:51 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e63604006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  754.807245][ T8184] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  754.883040][ T8193] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:52 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000600e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  754.931580][ T8199] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
[  754.953367][ T8210] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
03:42:52 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001", 0x1d, 0x400}], 0x5, 0x0)

[  754.979328][ T8193] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  754.996003][ T8193] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  755.008306][ T8193] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
03:42:52 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a}], 0x5, 0x0)

[  755.061049][ T8193] EXT4-fs (loop1): corrupt root inode, run e2fsck
[  755.067653][ T8193] EXT4-fs (loop1): mount failed
[  755.122212][ T8207] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  755.162118][ T8212] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:52 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05"], 0x9c}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:52 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000700e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  755.201521][ T8212] EXT4-fs (loop0): #clusters per group too big: 16384
[  755.309627][ T8229] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
[  755.315162][ T8230] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[  755.451469][ T8227] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  755.468268][ T8243] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  755.496337][ T8238] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  755.524412][ T8227] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:42:52 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e63704006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:52 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001", 0x1d, 0x400}], 0x5, 0x0)

[  755.539963][ T8238] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
03:42:52 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a}], 0x5, 0x0)

[  755.573069][ T8238] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  755.612570][ T8238] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  755.622182][ T8227] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  755.669124][ T8238] EXT4-fs (loop1): corrupt root inode, run e2fsck
[  755.675709][ T8238] EXT4-fs (loop1): mount failed
03:42:52 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000700e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:52 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000800e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:53 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05"], 0x9c}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  755.810128][ T8252] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  755.820039][ T8259] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
[  755.826684][ T8261] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[  755.849465][ T8252] EXT4-fs (loop0): #clusters per group too big: 16384
03:42:53 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0)

03:42:53 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e63804006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  756.049741][ T8273] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  756.071751][ T8273] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:42:53 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000", 0x2c, 0x400}], 0x5, 0x0)

[  756.103186][ T8274] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  756.110156][ T8273] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  756.234282][ T8290] EXT4-fs (loop5): bad geometry: block count 1080 exceeds size of device (1 blocks)
[  756.244476][ T8281] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  756.337015][ T8294] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[  756.342389][ T8291] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:53 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0)

03:42:53 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000800e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:53 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000900e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  756.382018][ T8291] EXT4-fs (loop0): #clusters per group too big: 16384
03:42:53 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e63904006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  756.418814][ T8281] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  756.475020][ T8281] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  756.488501][ T8281] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  756.512732][ T8281] EXT4-fs (loop1): corrupt root inode, run e2fsck
[  756.524041][ T8281] EXT4-fs (loop1): mount failed
03:42:53 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000", 0x2c, 0x400}], 0x5, 0x0)

[  756.569082][ T8307] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  756.600247][ T8309] EXT4-fs (loop5): bad geometry: block count 1080 exceeds size of device (1 blocks)
[  756.610010][ T8307] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:42:53 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05"], 0x9c}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  756.631379][ T8307] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:42:53 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0)

[  756.786038][ T8320] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  756.791157][ T8321] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  756.810013][ T8324] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
03:42:54 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000900e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  756.838970][ T8321] EXT4-fs (loop0): #clusters per group too big: 16384
03:42:54 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000a00e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  756.975378][ T8337] EXT4-fs (loop5): bad geometry: block count 1080 exceeds size of device (1 blocks)
[  757.018307][ T8331] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:54 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000", 0x2c, 0x400}], 0x5, 0x0)

03:42:54 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e63a04006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  757.129310][ T8331] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  757.178060][ T8344] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:54 executing program 5:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000001680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0)
pipe(&(0x7f0000000180)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x0)
write(r3, &(0x7f0000000340), 0x41395527)
vmsplice(r2, 0x0, 0x0, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x386, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
futex(&(0x7f0000000480), 0x8b, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500)=0x2, 0x2)
syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00')

[  757.233518][ T8349] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  757.243271][ T8344] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  757.262508][ T8331] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  757.288576][ T8344] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  757.307903][ T8331] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
03:42:54 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000a00e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:54 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe", 0x33, 0x400}], 0x5, 0x0)

[  757.358263][ T8361] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[  757.358701][ T8331] EXT4-fs (loop1): corrupt root inode, run e2fsck
[  757.383413][ T8331] EXT4-fs (loop1): mount failed
[  757.446433][ T8362] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  757.463289][ T8362] EXT4-fs (loop0): #clusters per group too big: 16384
03:42:54 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000b00e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  757.555093][ T8381] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
03:42:54 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe", 0x33, 0x400}], 0x5, 0x0)

03:42:54 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e63b04006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  757.623207][ T8382] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  757.651421][ T8382] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:42:54 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x87}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  757.673290][ T8382] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:42:54 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000b00e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  757.804782][ T8396] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
03:42:55 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe", 0x33, 0x400}], 0x5, 0x0)

[  757.931156][ T8395] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  757.956296][ T8398] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  757.966772][ T8399] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  757.979403][ T8398] EXT4-fs (loop0): #clusters per group too big: 16384
[  758.019548][ T8399] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
03:42:55 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000c00e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  758.060922][ T8399] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  758.079064][ T8399] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  758.095910][ T8415] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
03:42:55 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e63c04006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  758.133136][ T8399] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
[  758.160663][ T8410] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:55 executing program 5:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000001680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0)
pipe(&(0x7f0000000180)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x0)
write(r3, &(0x7f0000000340), 0x41395527)
vmsplice(r2, 0x0, 0x0, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x386, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
futex(&(0x7f0000000480), 0x8b, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500)=0x2, 0x2)
syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00')

[  758.189518][ T8399] EXT4-fs (loop1): get root inode failed
[  758.206460][ T8410] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  758.211451][ T8399] EXT4-fs (loop1): mount failed
[  758.217930][ T8410] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:42:55 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ff", 0x37, 0x400}], 0x5, 0x0)

03:42:55 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000c00e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:55 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x87}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  758.385709][ T8425] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  758.429607][ T8425] EXT4-fs (loop0): #clusters per group too big: 16384
[  758.446869][ T8432] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:42:55 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e63d04006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  758.495546][ T8444] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
03:42:55 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ff", 0x37, 0x400}], 0x5, 0x0)

03:42:55 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000d00e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  758.640680][ T8445] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  758.659024][ T8450] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  758.702289][ T8445] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  758.730723][ T8450] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  758.736860][ T8445] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  758.757250][ T8450] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  758.767634][ T8450] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  758.796876][ T8450] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
[  758.809902][ T8450] EXT4-fs (loop1): get root inode failed
[  758.815656][ T8450] EXT4-fs (loop1): mount failed
[  758.834751][ T8455] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:56 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000d00e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  758.874367][ T8455] EXT4-fs (loop0): #clusters per group too big: 16384
[  758.910329][ T8465] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
03:42:56 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x87}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:56 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e63e04006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:56 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ff", 0x37, 0x400}], 0x5, 0x0)

03:42:56 executing program 5:
pipe(&(0x7f0000000140)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = epoll_create1(0x0)
dup2(r3, r2)
creat(0x0, 0x0)
write(r1, &(0x7f00000001c0), 0xfffffef3)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clock_gettime(0x0, &(0x7f0000000240))
pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000180)={0x1ff}, 0x0, 0x0)
vmsplice(r0, 0x0, 0x0, 0x0)

[  759.148212][ T8472] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  759.214452][ T8479] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  759.224226][ T8484] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  759.233604][ T8490] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[  759.253285][ T8480] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  759.263631][ T8484] EXT4-fs (loop0): #clusters per group too big: 16384
[  759.271655][ T8480] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  759.281948][ T8479] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  759.286027][ T8480] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  759.307278][ T8479] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  759.308687][ T8480] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
03:42:56 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e63f04006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:56 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53", 0x39, 0x400}], 0x5, 0x0)

03:42:56 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000e00e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  759.366805][ T8480] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
[  759.404601][ T8480] EXT4-fs (loop1): get root inode failed
[  759.429096][ T8480] EXT4-fs (loop1): mount failed
03:42:56 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000e00e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:56 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB, @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x87}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  759.654297][ T8508] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  759.675141][ T8513] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
03:42:56 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53", 0x39, 0x400}], 0x5, 0x0)

[  759.718999][ T8508] EXT4-fs (loop0): #clusters per group too big: 16384
[  759.838410][ T8514] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  759.864969][ T8525] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  759.905294][ T8522] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  759.921383][ T8525] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  759.936243][ T8522] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:42:57 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6f925006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:57 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019001000e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  759.973268][ T8536] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[  759.995147][ T8522] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  760.019521][ T8525] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  760.030058][ T8525] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  760.058751][ T8525] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
03:42:57 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53", 0x39, 0x400}], 0x5, 0x0)

03:42:57 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019001000e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  760.118307][ T8525] EXT4-fs (loop1): get root inode failed
[  760.127482][ T8525] EXT4-fs (loop1): mount failed
03:42:57 executing program 5:
accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0)
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0)
pipe(&(0x7f0000000480)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x4000000000000000)
write(r3, &(0x7f0000000340), 0x41395527)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0)
ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r4, 0x80045301, 0x0)
ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0))
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r5=>0xffffffffffffffff})
r6 = dup2(r5, 0xffffffffffffffff)
sendmsg$netlink(r6, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="000000000000e056824e000000000000"]}], 0x1, &(0x7f0000000100)=ANY=[]}, 0x0)
r7 = socket(0x40000000015, 0x5, 0x0)
close(r7)
getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, &(0x7f0000000440))
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x98428d57a99b5f44)

03:42:57 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB, @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x87}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  760.285378][ T8548] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  760.295784][ T8549] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  760.308541][ T8555] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[  760.334756][ T8554] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  760.343515][ T8549] EXT4-fs (loop0): #clusters per group too big: 16384
[  760.384448][ T8554] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  760.395717][ T8554] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:42:57 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019001100e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:57 executing program 5:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_emit_ethernet(0x5c, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@timestamp={0x44, 0x4, 0x5}, @ssrr={0x89, 0x2}]}}, @tipc=@payload_mcast={{{{{{0x32, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}}}}, 0x0)

03:42:57 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a}], 0x5, 0x0)

[  760.577283][ T8569] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:57 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6ff25006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:57 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019001100e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  760.659578][ T8569] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  760.693497][ T8569] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  760.751031][ T8569] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
03:42:58 executing program 5:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071")
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
mmap(&(0x7f0000578000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0)
mmap(&(0x7f0000b40000/0xb000)=nil, 0xb000, 0x0, 0x11, r1, 0x0)
mmap(&(0x7f0000b69000/0xd000)=nil, 0xd000, 0x0, 0x31, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000977000/0x200000)=nil, 0x200000, 0x0, 0x6031, 0xffffffffffffffff, 0x0)

[  760.817967][ T8592] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[  760.830504][ T8569] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
[  760.863328][ T8585] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  760.872874][ T8585] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  760.894096][ T8585] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:42:58 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a}], 0x5, 0x0)

[  760.909435][ T8569] EXT4-fs (loop1): get root inode failed
[  760.915102][ T8569] EXT4-fs (loop1): mount failed
03:42:58 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019001200e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:58 executing program 5:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xffffffffffffff44}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={0x0}}, 0x0)
sendmsg$key(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0)
sendmmsg(r0, &(0x7f0000000180), 0x7b, 0x0)

[  760.979814][ T8595] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  761.009654][ T8595] EXT4-fs (loop0): #clusters per group too big: 16384
[  761.139097][ T8599] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  761.145242][ T8611] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
03:42:58 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6009d006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:58 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB, @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x87}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:58 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a}], 0x5, 0x0)

[  761.353329][ T8624] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:58 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019001200e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  761.459524][ T8624] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  761.489049][ T8638] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  761.489781][ T8624] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  761.512815][ T8643] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  761.557552][ T8643] EXT4-fs (loop0): #clusters per group too big: 16384
[  761.582495][ T8652] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[  761.608929][ T8638] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  761.621554][ T8638] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  761.631669][ T8638] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
03:42:58 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019002300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  761.657329][ T8638] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
[  761.672041][ T8638] EXT4-fs (loop1): get root inode failed
[  761.678521][ T8638] EXT4-fs (loop1): mount failed
03:42:58 executing program 5:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd"], 0x9b}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:59 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e600a2006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  761.822062][ T8661] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:42:59 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0)

03:42:59 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe05", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x92}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:59 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019002300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  762.050525][ T8675] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  762.069871][ T8683] EXT4-fs (loop2): bad geometry: block count 1080 exceeds size of device (1 blocks)
[  762.092194][ T8675] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  762.120349][ T8673] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended
[  762.156667][ T8675] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  762.173273][ T8673] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  762.191832][ T8673] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  762.201727][ T8673] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock
03:42:59 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0)

[  762.226218][ T8684] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  762.247834][ T8673] EXT4-fs (loop5): corrupt root inode, run e2fsck
[  762.256833][ T8673] EXT4-fs (loop5): mount failed
[  762.265422][ T8684] EXT4-fs (loop0): #clusters per group too big: 16384
[  762.312527][ T8691] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
03:42:59 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019002d00e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  762.359596][ T8698] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  762.368339][ T8691] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  762.389147][ T8691] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  762.415966][ T8691] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  762.433629][ T8691] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
[  762.463661][ T8691] EXT4-fs (loop1): get root inode failed
[  762.469868][ T8691] EXT4-fs (loop1): mount failed
03:42:59 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60102006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:42:59 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

[  762.536781][ T8709] EXT4-fs (loop2): bad geometry: block count 1080 exceeds size of device (1 blocks)
03:42:59 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe05", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x92}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:42:59 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019002d00e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  762.648459][ T8713] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  762.673732][ T8713] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:42:59 executing program 2:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r2, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0)

[  762.734162][ T8713] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:00 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019002f00e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  762.855994][ T8725] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  762.895883][ T8732] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  762.909101][ T8723] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  762.961681][ T8725] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  762.972267][ T8723] EXT4-fs (loop0): #clusters per group too big: 16384
[  762.979907][ T8725] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  762.994852][ T8725] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
03:43:00 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900b401e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  763.019888][ T8725] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
[  763.055684][ T8725] EXT4-fs (loop1): get root inode failed
03:43:00 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60103006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  763.082731][ T8745] EXT4-fs (loop2): bad geometry: block count 1080 exceeds size of device (1 blocks)
[  763.114407][ T8725] EXT4-fs (loop1): mount failed
[  763.227897][ T8747] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  763.264289][ T8757] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:00 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:00 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe05", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x92}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  763.286419][ T8747] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  763.324955][ T8747] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:00 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900c003e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  763.446047][ T8764] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  763.459103][ T8764] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:00 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:00 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900c003e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:00 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60104006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:00 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  763.621864][ T8776] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  763.693077][ T8776] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  763.745046][ T8776] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  763.745776][ T8781] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:00 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  763.796685][ T8776] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  763.826515][ T8790] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:01 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  763.851007][ T8790] EXT4-fs (loop0): #clusters per group too big: 16384
[  763.855111][ T8781] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  763.869308][ T8776] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
[  763.880136][ T8781] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  763.920141][ T8776] EXT4-fs (loop1): get root inode failed
[  763.935831][ T8776] EXT4-fs (loop1): mount failed
[  763.949405][ T8789] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:01 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60105006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:01 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

03:43:01 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:01 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000302e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:01 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f07", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x98}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:01 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

03:43:01 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

03:43:01 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000302e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  764.356245][ T8820] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  764.378950][ T8820] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:01 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60106006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  764.472954][ T8824] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  764.493471][ T8824] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  764.510193][ T8824] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:01 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:01 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

[  764.609866][ T8827] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  764.656534][ T8827] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
03:43:01 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000303e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  764.727269][ T8845] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:02 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

[  764.768980][ T8827] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  764.780117][ T8845] EXT4-fs (loop0): #clusters per group too big: 16384
[  764.797183][ T8842] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:02 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  764.859464][ T8827] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  764.870323][ T8827] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
[  764.883538][ T8827] EXT4-fs (loop1): get root inode failed
[  764.890343][ T8827] EXT4-fs (loop1): mount failed
[  765.016419][ T8858] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:02 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60107006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:02 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f07", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x98}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:02 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, 0x0, 0x608800, 0x0)

03:43:02 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000303e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  765.103192][ T8858] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  765.197175][ T8858] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:02 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0)

[  765.337543][ T8877] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  765.358977][ T8877] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:02 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, 0x0, 0x608800, 0x0)

[  765.396284][ T8881] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  765.408939][ T8883] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:02 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000304e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  765.438535][ T8881] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  765.449635][ T8881] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  765.472663][ T8881] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  765.504547][ T8881] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
03:43:02 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60108006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:02 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000304e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  765.517350][ T8881] EXT4-fs (loop1): get root inode failed
[  765.517357][ T8881] EXT4-fs (loop1): mount failed
03:43:02 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0)

03:43:02 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f07", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x98}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  765.732309][ T8901] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  765.841433][ T8901] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:43:03 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, 0x0, 0x608800, 0x0)

[  765.892298][ T8912] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  765.899846][ T8901] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:03 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000305e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:03 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0)

[  766.037114][ T8911] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:03 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000305e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  766.096827][ T8921] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  766.127320][ T8911] EXT4-fs (loop0): #clusters per group too big: 16384
[  766.178183][ T8921] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  766.254530][ T8921] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
03:43:03 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60109006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:03 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

[  766.311155][ T8936] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  766.312282][ T8921] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  766.342807][ T8936] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:43:03 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, 0x0, 0x608800, 0x0)

03:43:03 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000306e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  766.375543][ T8936] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  766.400908][ T8940] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  766.453761][ T8921] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated
[  766.509853][ T8921] EXT4-fs (loop1): get root inode failed
03:43:03 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, 0x0, 0x608800, 0x0)

[  766.553982][ T8921] EXT4-fs (loop1): mount failed
[  766.579033][ T8951] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:03 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000306e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:03 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, 0x0, 0x608800, 0x0)

[  766.648987][ T8951] EXT4-fs (loop0): #clusters per group too big: 16384
[  766.723692][ T8960] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:03 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9b}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  766.779586][ T8960] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:43:04 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6010a006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  766.839113][ T8960] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:04 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000307e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  767.010916][ T8981] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:04 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, 0x0, 0x608800, 0x0)

03:43:04 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, 0x0, 0x608800, 0x0)

[  767.079146][ T8982] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  767.117889][ T8982] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  767.139898][ T8987] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  767.182145][ T8982] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  767.208996][ T8987] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:04 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000307e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  767.235910][ T8982] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  767.257158][ T8982] EXT4-fs (loop1): corrupt root inode, run e2fsck
[  767.305680][ T8982] EXT4-fs (loop1): mount failed
03:43:04 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6010b006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  767.349924][ T9000] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  767.379125][ T9000] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:43:04 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9b}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:04 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

03:43:04 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

[  767.479003][ T9000] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:04 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000308e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  767.588194][ T9010] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  767.619410][ T9014] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:04 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

[  767.686524][ T9018] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  767.718302][ T9014] EXT4-fs (loop0): #clusters per group too big: 16384
[  767.754282][ T9018] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  767.774099][ T9018] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  767.786148][ T9018] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
03:43:04 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, 0x0, 0x0)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

03:43:05 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000308e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  767.817840][ T9018] EXT4-fs (loop1): corrupt root inode, run e2fsck
[  767.853380][ T9018] EXT4-fs (loop1): mount failed
03:43:05 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6010c006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  767.901340][ T9031] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  767.939518][ T9031] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  767.950026][ T9031] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:05 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9b}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:05 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000309e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:05 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

03:43:05 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, 0x0, 0x0)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

[  768.196613][ T9050] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  768.225258][ T9051] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  768.274020][ T9051] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:05 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

[  768.366149][ T9054] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  768.379737][ T9054] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
03:43:05 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6010d006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  768.424861][ T9062] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  768.432404][ T9054] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  768.454181][ T9062] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:43:05 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

03:43:05 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000309e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  768.476072][ T9062] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  768.483366][ T9054] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  768.529160][ T9054] EXT4-fs (loop1): corrupt root inode, run e2fsck
[  768.535838][ T9054] EXT4-fs (loop1): mount failed
03:43:05 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900030ae60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:05 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f2", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9c}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:05 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

[  768.786515][ T9086] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  768.832235][ T9093] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  768.850326][ T9090] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  768.890941][ T9093] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  768.907775][ T9090] EXT4-fs (loop0): #clusters per group too big: 16384
[  768.943657][ T9099] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  768.958361][ T9093] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  768.975573][ T9099] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  768.986392][ T9099] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
03:43:06 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900030ae60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  769.019177][ T9099] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
03:43:06 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6010e006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:06 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900030be60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:06 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

[  769.080646][ T9099] EXT4-fs (loop1): corrupt root inode, run e2fsck
[  769.112554][ T9099] EXT4-fs (loop1): mount failed
03:43:06 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f2", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9c}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  769.244903][ T9116] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:06 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280))
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

03:43:06 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

[  769.331069][ T9122] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  769.414856][ T9122] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  769.427490][ T9121] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:06 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900030be60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  769.481622][ T9122] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  769.515138][ T9131] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  769.521143][ T9121] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:06 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, 0x0)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

[  769.557494][ T9131] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  769.577942][ T9131] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  769.610013][ T9131] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
03:43:06 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900030ce60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:06 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60110006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  769.655283][ T9131] EXT4-fs (loop1): corrupt root inode, run e2fsck
[  769.687551][ T9131] EXT4-fs (loop1): mount failed
03:43:07 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f2", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9c}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  769.865059][ T9150] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  769.917818][ T9161] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  769.951480][ T9161] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  769.976747][ T9164] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  769.998913][ T9164] EXT4-fs (loop0): #clusters per group too big: 16384
[  770.015561][ T9161] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  770.035005][ T9170] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  770.045949][ T9175] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  770.065223][ T9175] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  770.075644][ T9175] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
03:43:07 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60111006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:07 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900030de60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:07 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900030ce60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  770.123847][ T9175] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  770.136836][ T9175] EXT4-fs (loop1): corrupt root inode, run e2fsck
[  770.151770][ T9175] EXT4-fs (loop1): mount failed
03:43:07 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, 0x0)
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  770.352362][ T9182] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  770.364104][ T9186] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  770.399185][ T9182] EXT4-fs (loop0): #clusters per group too big: 16384
[  770.425373][ T9186] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:43:07 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280))
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

[  770.441688][ T9186] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:07 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60112006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:07 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, 0x0)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

[  770.582390][ T9195] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  770.616551][ T9196] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:07 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900030ee60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  770.645681][ T9195] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  770.681448][ T9195] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  770.752174][ T9195] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue
03:43:07 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, 0x0)
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:07 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900030de60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  770.864632][ T9211] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  770.877903][ T9211] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:08 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60125006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  770.978973][ T9217] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  771.020612][ T9226] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  771.039727][ T9217] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  771.054905][ T9217] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:08 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900030ee60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  771.155696][ T9227] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
03:43:08 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000310e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  771.205333][ T9227] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  771.216705][ T9237] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  771.242869][ T9237] EXT4-fs (loop0): #clusters per group too big: 16384
[  771.254613][ T9227] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  771.285593][ T9227] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue
03:43:08 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6012d006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  771.357399][ T9245] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:08 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, 0x0)
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:08 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, 0x0)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

03:43:08 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000310e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:08 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x0, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

[  771.541442][ T9253] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  771.596925][ T9259] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  771.609047][ T9253] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  771.642011][ T9253] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  771.648943][ T9259] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:08 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000311e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:09 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6012f006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  771.832704][ T9270] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
03:43:09 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, 0x0, 0x0)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

[  771.874653][ T9277] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  771.992740][ T9270] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
03:43:09 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000311e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:09 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

[  772.043424][ T9270] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  772.069442][ T9289] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  772.069504][ T9270] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue
[  772.099054][ T9292] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  772.113565][ T9289] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  772.134440][ T9289] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  772.145123][ T9292] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:09 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:09 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60148006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:09 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

03:43:09 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000312e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  772.302091][ T9304] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:09 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

[  772.450716][ T9312] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
03:43:09 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000312e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  772.556091][ T9312] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
03:43:09 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

[  772.647259][ T9312] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  772.691646][ T9323] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  772.703137][ T9326] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  772.725972][ T9312] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue
[  772.748934][ T9326] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:43:09 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  772.809541][ T9323] EXT4-fs (loop0): #clusters per group too big: 16384
[  772.817204][ T9326] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:10 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

03:43:10 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

03:43:10 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

[  773.035974][ T9337] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:10 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6014c006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:10 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000325e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:10 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

03:43:10 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000325e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  773.270449][ T9355] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
03:43:10 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

[  773.348167][ T9355] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  773.427945][ T9366] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  773.436917][ T9355] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  773.476516][ T9367] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  773.493956][ T9366] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  773.503004][ T9355] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue
[  773.510806][ T9367] EXT4-fs (loop0): #clusters per group too big: 16384
[  773.518549][ T9366] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:10 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:10 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6015c006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:10 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900032de60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  773.660823][ T9380] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  773.832112][ T9391] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  773.842717][ T9393] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  773.869255][ T9391] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
03:43:11 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900032de60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  773.874284][ T9393] EXT4-fs (loop0): #clusters per group too big: 16384
[  773.913265][ T9391] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  773.935425][ T9391] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue
[  773.959975][ T9401] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  773.992377][ T9401] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:43:11 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60160006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:11 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, 0x0, 0x0)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  774.024005][ T9401] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  774.106275][ T9408] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:11 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900032fe60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:11 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

03:43:11 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000348e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:11 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0), 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

[  774.396599][ T9419] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  774.437285][ T9424] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  774.447262][ T9419] EXT4-fs (loop0): #clusters per group too big: 16384
[  774.483738][ T9426] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  774.499053][ T9424] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  774.514899][ T9424] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
03:43:11 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  774.537019][ T9426] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:43:11 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60168006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  774.586880][ T9426] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  774.602599][ T9437] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  774.612935][ T9424] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue
03:43:11 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900034ce60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:11 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000348e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:11 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, 0x0, 0x0)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:12 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  774.817699][ T9450] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  774.855887][ T9450] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:12 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6016c006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  774.990336][ T9460] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  775.030869][ T9459] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  775.076618][ T9460] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  775.111425][ T9460] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:12 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:12 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:12 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900035ce60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:12 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900034ce60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  775.285419][ T9471] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  775.286286][ T9476] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  775.385678][ T9471] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  775.463142][ T9471] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
03:43:12 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  775.506364][ T9476] EXT4-fs (loop0): #clusters per group too big: 16384
[  775.526929][ T9471] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue
03:43:12 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:12 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, 0x0, 0x0)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  775.580681][ T9494] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  775.604749][ T9494] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  775.616757][ T9494] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  775.645792][ T9493] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:12 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60174006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:12 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900035ce60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:13 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:13 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000360e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:13 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  776.023165][ T9514] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  776.075223][ T9514] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  776.136029][ T9514] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  776.169782][ T9517] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  776.185208][ T9516] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  776.203985][ T9526] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  776.225031][ T9516] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
03:43:13 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

03:43:13 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:13 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000360e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  776.243966][ T9517] EXT4-fs (loop0): #clusters per group too big: 16384
[  776.270199][ T9516] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  776.304429][ T9516] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue
03:43:13 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6017a006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:13 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:13 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:13 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000368e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:13 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

[  776.614740][ T9549] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:13 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  776.690932][ T9549] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  776.700190][ T9549] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:13 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000368e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:13 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  776.792050][ T9558] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:14 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  776.847706][ T9558] EXT4-fs (loop0): #clusters per group too big: 16384
[  776.887528][ T9564] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  776.924153][ T9565] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  776.964597][ T9564] EXT4-fs (loop1): bad geometry: block count 34359739448 exceeds size of device (66048 blocks)
[  777.072303][ T9580] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:14 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900036ce60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:14 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:14 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:14 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601fc006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  777.142225][ T9580] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:43:14 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  777.199079][ T9580] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:14 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900036ce60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:14 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:14 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  777.440863][ T9598] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  777.467585][ T9599] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  777.511188][ T9598] EXT4-fs (loop1): bad geometry: block count 34359739448 exceeds size of device (66048 blocks)
[  777.540566][ T9605] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  777.557451][ T9599] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:14 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:14 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:14 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

[  777.780043][ T9612] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:15 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60188016c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  777.829796][ T9612] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:43:15 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000374e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  777.882888][ T9612] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:15 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

03:43:15 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000374e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  778.036310][ T9634] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  778.104810][ T9634] EXT4-fs (loop1): bad geometry: block count 34359739448 exceeds size of device (66048 blocks)
03:43:15 executing program 5:
openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(0xffffffffffffffff)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

03:43:15 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:15 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  778.269459][ T9646] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  778.292786][ T9644] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  778.338985][ T9646] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:15 executing program 5:
openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0)
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

[  778.440821][ T9648] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  778.465704][ T9648] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:43:15 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60104026c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  778.504751][ T9648] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:15 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900037ae60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:15 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900037ae60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:15 executing program 5:
openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0)
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

[  778.761364][ T9670] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  778.807320][ T9674] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  778.841789][ T9670] EXT4-fs (loop1): bad geometry: block count 34359739448 exceeds size of device (66048 blocks)
[  778.872872][ T9674] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:16 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:16 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  779.045951][ T9684] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  779.082741][ T9682] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  779.090239][ T9684] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:43:16 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60177026c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  779.122342][ T9684] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:16 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60200006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:16 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="80000000380400001900037de60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  779.349830][ T9700] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  779.436487][ T9700] EXT4-fs (loop1): bad geometry: block count 34359739448 exceeds size of device (66048 blocks)
[  779.439600][ T9706] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  779.508678][ T9706] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:16 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:16 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:16 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100036c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  779.643589][ T9715] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  779.657344][ T9715] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  779.670201][ T9717] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  779.719454][ T9715] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:16 executing program 5:
openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0)
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

[  779.853702][ T9730] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  779.869831][ T9731] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:17 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60300006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:17 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60200006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  779.909548][ T9730] EXT4-fs (loop1): bad geometry: block count 34359739448 exceeds size of device (66048 blocks)
[  779.939021][ T9731] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:17 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:17 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60102046c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  780.223979][ T9751] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  780.240730][ T9751] EXT4-fs (loop1): bad geometry: block count 34359739448 exceeds size of device (66048 blocks)
[  780.284748][ T9750] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  780.300532][ T9752] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:17 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  780.336813][ T9752] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  780.346411][ T9752] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:17 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60400006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:17 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60300006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:17 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  780.457215][ T9758] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  780.496855][ T9758] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:17 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60106046c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  780.632954][ T9767] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
[  780.664128][ T9771] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:17 executing program 5:
openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0)
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

[  780.728148][ T9771] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  780.744830][ T9767] EXT4-fs (loop1): bad geometry: block count 34359739448 exceeds size of device (66048 blocks)
03:43:18 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  780.805078][ T9771] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  780.935278][ T9785] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  780.950442][ T9782] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:18 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60600006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  780.975846][ T9785] EXT4-fs (loop0): #clusters per group too big: 16384
[  781.086012][ T9797] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:18 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60400006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:18 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60110046c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  781.127738][ T9797] EXT4-fs (loop1): bad geometry: block count 34359739448 exceeds size of device (66048 blocks)
[  781.274500][ T9805] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  781.304157][ T9805] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  781.312545][ T9805] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:18 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x5, 0x0)

[  781.324943][ T9812] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:18 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60700006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  781.430957][ T9813] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  781.465603][ T9813] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:18 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60500006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:18 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:18 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100056c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  781.659184][ T9830] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:18 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x5, 0x0)

[  781.722957][ T9830] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  781.755222][ T9830] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  781.755904][ T9833] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:19 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  781.787611][ T9840] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  781.817864][ T9840] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:19 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60800006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:19 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x5, 0x0)

03:43:19 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100066c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:19 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60600006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  782.337575][ T9868] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  782.337580][ T9872] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  782.337592][ T9872] EXT4-fs (loop0): #clusters per group too big: 16384
[  782.356622][ T9871] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:19 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x5, 0x0)

[  782.407458][ T9868] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  782.416832][ T9868] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:19 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60a00006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:19 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:19 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60104066c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:19 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60700006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:19 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x5, 0x0)

03:43:19 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  782.850944][ T9895] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  782.910908][ T9903] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  782.926482][ T9902] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  782.944035][ T9895] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:43:20 executing program 5:
openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0)
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x608800, 0x0)

03:43:20 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x5, 0x0)

[  782.965082][ T9902] EXT4-fs (loop0): #clusters per group too big: 16384
[  782.990540][ T9895] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:20 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:20 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100076c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:20 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60800006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:20 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60b00006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:20 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x5, 0x0)

03:43:20 executing program 5:
openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0)
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:20 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  783.428792][ T9935] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  783.438468][ T9935] EXT4-fs (loop0): #clusters per group too big: 16384
[  783.445760][ T9940] EXT4-fs (loop1): VFS: Can't find ext4 filesystem
[  783.446011][ T9936] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:20 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100096c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:20 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x5, 0x0)

03:43:20 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  783.611422][ T9941] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  783.639200][ T9941] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:43:20 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60a00006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  783.699154][ T9941] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:20 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  783.856157][ T9967] EXT4-fs (loop1): VFS: Can't find ext4 filesystem
[  783.867849][ T9959] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:21 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60d00006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  783.912539][ T9959] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:21 executing program 5:
openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0)
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:21 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  783.977078][ T9971] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:21 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x5, 0x0)

03:43:21 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601000a6c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:21 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60b00006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:21 executing program 5:
pipe(&(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
write$binfmt_elf32(r0, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
connect$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x100000000, 0x0)

[  784.188735][ T9983] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  784.219753][ T9983] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:43:21 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  784.269003][ T9983] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  784.292612][T10000] EXT4-fs (loop1): VFS: Can't find ext4 filesystem
03:43:21 executing program 5:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3f00000000000000, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:21 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60f00006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:21 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x5, 0x0)

[  784.434592][T10006] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  784.451799][ T9999] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  784.533016][ T9999] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:21 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:21 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601000b6c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:21 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60d00006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  784.683076][T10022] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended
[  784.694323][T10022] EXT4-fs (loop5): #clusters per group too big: 16384
[  784.701621][T10027] EXT4-fs (loop1): VFS: Can't find ext4 filesystem
03:43:21 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  784.828008][T10025] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:22 executing program 5:
perf_event_open(&(0x7f00000002c0)={0x9, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0)
openat(0xffffffffffffffff, 0x0, 0x0, 0xd)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="000000f21301ce646ba1a34578d3abdf1e15566701800100000000006722b4"], 0x1}}, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil})
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xff], 0x1f004})
ioctl$KVM_RUN(r2, 0xae80, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

[  784.874766][T10025] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:43:22 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x5, 0x0)

[  784.917435][T10025] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:22 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:22 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e61400006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  785.031164][T10040] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  785.046624][T10043] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  785.093409][T10043] EXT4-fs (loop0): #clusters per group too big: 16384
[  785.113291][T10058] EXT4-fs (loop1): VFS: Can't find ext4 filesystem
03:43:22 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:22 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601000c6c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:22 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:22 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60f00006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:22 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x5, 0x0)

[  785.343851][T10065] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  785.410180][T10065] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  785.465914][T10065] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:22 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  785.537002][T10085] EXT4-fs (loop1): VFS: Can't find ext4 filesystem
[  785.562701][T10079] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:22 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e62d00006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:22 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x400}], 0x5, 0x0)

[  785.611649][T10088] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  785.626431][T10079] EXT4-fs (loop0): #clusters per group too big: 16384
[  785.818980][T10106] EXT4-fs (loop1): VFS: Can't find ext4 filesystem
[  785.893096][T10102] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  785.956746][T10102] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  785.966535][T10102] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:23 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:23 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601000d6c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:23 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e61400006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:23 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:23 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x400}], 0x5, 0x0)

03:43:23 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e62f00006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:23 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  786.224788][T10129] EXT4-fs (loop1): VFS: Can't find ext4 filesystem
[  786.236730][T10123] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  786.269811][T10123] EXT4-fs (loop0): #clusters per group too big: 16384
[  786.281091][T10124] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:23 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x400}], 0x5, 0x0)

03:43:23 executing program 2:
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(0xffffffffffffffff)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0)

[  786.420066][T10137] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:23 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e62d00006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:23 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601000e6c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  786.467783][T10137] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:43:23 executing program 2:
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(0xffffffffffffffff)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0)

[  786.540931][T10137] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  786.577347][T10155] EXT4-fs (loop1): VFS: Can't find ext4 filesystem
[  786.697995][T10160] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  786.731846][T10160] EXT4-fs (loop0): #clusters per group too big: 16384
[  786.750069][T10162] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:24 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:24 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040), 0x0, 0x400}], 0x5, 0x0)

03:43:24 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e66400006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:24 executing program 2:
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(0xffffffffffffffff)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0)

03:43:24 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6013b0f6c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:24 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e66400006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:24 executing program 2:
pipe(0x0)
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(0xffffffffffffffff)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0)

03:43:24 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  787.062898][T10189] EXT4-fs (loop1): VFS: Can't find ext4 filesystem
03:43:24 executing program 2:
pipe(0x0)
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(0xffffffffffffffff)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0)

[  787.181275][T10185] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  787.190865][T10188] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  787.222908][T10192] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:24 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040), 0x0, 0x400}], 0x5, 0x0)

03:43:24 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  787.263155][T10188] EXT4-fs (loop0): #clusters per group too big: 16384
[  787.282728][T10185] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  787.297355][T10185] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:24 executing program 2:
pipe(0x0)
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(0xffffffffffffffff)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0)

03:43:24 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6f601006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:24 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6f601006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:24 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60104106c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:24 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  787.552465][T10221] EXT4-fs (loop1): VFS: Can't find ext4 filesystem
03:43:24 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040), 0x0, 0x400}], 0x5, 0x0)

[  787.733222][T10231] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  787.749052][T10230] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  787.759031][T10231] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  787.779237][T10227] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:24 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  787.807251][T10231] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  787.813182][T10230] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:25 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60120106c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  787.964894][T10244] EXT4-fs (loop1): VFS: Can't find ext4 filesystem
03:43:25 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e64002006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:25 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e68a03006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:25 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001", 0x1d, 0x400}], 0x5, 0x0)

[  788.219471][T10259] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  788.240604][T10261] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  788.257883][T10259] EXT4-fs (loop0): #clusters per group too big: 16384
[  788.266697][T10261] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:43:25 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:25 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:25 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100116c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  788.296852][T10261] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  788.340181][T10262] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  788.340647][T10270] EXT4-fs (loop1): VFS: Can't find ext4 filesystem
03:43:25 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e68103006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:25 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:25 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001", 0x1d, 0x400}], 0x5, 0x0)

[  788.530582][T10282] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:25 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e62704006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:25 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  788.596081][T10282] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:25 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:25 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100126c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  788.757961][T10298] EXT4-fs (loop1): VFS: Can't find ext4 filesystem
[  788.774424][T10296] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  788.848024][T10296] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:43:26 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:26 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001", 0x1d, 0x400}], 0x5, 0x0)

[  788.893007][T10296] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:26 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  788.954096][T10303] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:26 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e68b03006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:26 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e62804006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  789.080450][T10315] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  789.110261][T10329] EXT4-fs (loop1): VFS: Can't find ext4 filesystem
03:43:26 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  789.169595][T10315] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:26 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000", 0x2c, 0x400}], 0x5, 0x0)

[  789.281584][T10335] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:26 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601001f6c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  789.361655][T10338] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  789.396731][T10338] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:43:26 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  789.434114][T10338] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  789.458500][T10354] EXT4-fs (loop1): VFS: Can't find ext4 filesystem
03:43:26 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:26 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e62a04006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:26 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000", 0x2c, 0x400}], 0x5, 0x0)

03:43:26 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:26 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e68c03006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  789.619143][T10356] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  789.679044][T10356] EXT4-fs (loop0): #clusters per group too big: 16384
[  789.756443][T10373] EXT4-fs (loop1): VFS: Can't find ext4 filesystem
03:43:27 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000", 0x2c, 0x400}], 0x5, 0x0)

03:43:27 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100206c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  789.827582][T10366] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:27 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:27 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  790.071236][T10391] EXT4-fs (loop1): VFS: Can't find ext4 filesystem
[  790.071464][T10384] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  790.097271][T10392] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  790.101528][T10384] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:43:27 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  790.122799][T10392] EXT4-fs (loop0): #clusters per group too big: 16384
[  790.129021][T10384] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:27 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe", 0x33, 0x400}], 0x5, 0x0)

03:43:27 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e64404006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:27 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:27 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60110206c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:27 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:27 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e68d03006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  790.384402][T10420] EXT4-fs (loop1): VFS: Can't find ext4 filesystem
[  790.497568][T10422] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  790.534832][T10430] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:27 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe", 0x33, 0x400}], 0x5, 0x0)

[  790.544926][T10422] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:27 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:27 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100256c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  790.581515][T10430] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  790.589991][T10426] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  790.599274][T10430] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:27 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:27 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60035006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  790.799101][T10446] EXT4-fs (loop1): VFS: Can't find ext4 filesystem
03:43:28 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e64504006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:28 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:28 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe", 0x33, 0x400}], 0x5, 0x0)

[  790.943755][T10451] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  790.972091][T10451] EXT4-fs (loop0): #clusters per group too big: 16384
[  791.019716][T10456] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  791.064972][T10456] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  791.084213][T10456] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:28 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:28 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601002d6c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  791.130290][T10460] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  791.166167][T10471] EXT4-fs (loop1): VFS: Can't find ext4 filesystem
03:43:28 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:28 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60095006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:28 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ff", 0x37, 0x400}], 0x5, 0x0)

03:43:28 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e64604006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:28 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  791.537184][T10485] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  791.558942][T10485] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:28 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601002f6c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  791.666648][T10499] EXT4-fs (loop1): VFS: Can't find ext4 filesystem
[  791.691033][T10502] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  791.700482][T10493] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:28 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:28 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ff", 0x37, 0x400}], 0x5, 0x0)

[  791.722825][T10493] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  791.731624][T10493] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:29 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6009b006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  791.909885][T10512] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  791.940110][T10512] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:29 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e64704006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  791.981133][T10523] EXT4-fs (loop1): VFS: Can't find ext4 filesystem
[  792.134585][T10528] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  792.165796][T10528] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:43:29 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:29 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:29 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6010f3b6c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:29 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ff", 0x37, 0x400}], 0x5, 0x0)

[  792.205000][T10528] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  792.219245][T10532] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:29 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6009c006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:29 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  792.368775][T10546] EXT4-fs (loop1): VFS: Can't find ext4 filesystem
03:43:29 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e64804006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:29 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  792.482872][T10547] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  792.511369][T10547] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:29 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53", 0x39, 0x400}], 0x5, 0x0)

[  792.556640][T10556] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  792.577007][T10556] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  792.588282][T10556] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:29 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601003f6c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:29 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:29 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60102006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  792.743682][T10575] EXT4-fs (loop1): VFS: Can't find ext4 filesystem
[  792.801612][T10568] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  792.944088][T10585] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  792.971245][T10585] EXT4-fs (loop0): #clusters per group too big: 16384
[  793.025560][T10590] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  793.064198][T10590] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  793.075019][T10590] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:30 executing program 5:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6040000, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:30 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53", 0x39, 0x400}], 0x5, 0x0)

03:43:30 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:30 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e64904006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:30 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100406c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:30 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60103006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:30 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  793.284569][T10610] EXT4-fs (loop1): VFS: Can't find ext4 filesystem
[  793.337264][T10608] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  793.348422][T10609] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  793.380660][T10609] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  793.383281][T10608] EXT4-fs (loop0): #clusters per group too big: 16384
[  793.413474][T10609] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:30 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100486c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:30 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53", 0x39, 0x400}], 0x5, 0x0)

[  793.428563][T10606] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  793.487031][T10618] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended
[  793.512342][T10618] EXT4-fs (loop5): #clusters per group too big: 16384
03:43:30 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:30 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e64a04006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:30 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60104006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  793.723083][T10635] EXT4-fs (loop1): VFS: Can't find ext4 filesystem
[  793.750947][T10633] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:31 executing program 5:
write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000000c0)={'syz1\x00', {}, 0x0, [], [], [0x300000, 0x5, 0xff, 0xe4800000, 0xffff, 0x4, 0x9, 0x3ff, 0x5, 0x9, 0x221, 0x3, 0x0, 0xe1b, 0x1, 0xfff, 0x0, 0x8000, 0x10000000, 0x7fffffff, 0x200], [0x8, 0x9, 0x83fe, 0x4, 0x80000001, 0xa22, 0x1, 0x400, 0x1, 0x1, 0x0, 0xa2, 0x1, 0x8000, 0x7, 0xffffffff, 0x7, 0x54bc, 0x7ff, 0x8, 0x7fff, 0x2, 0xfffffee8, 0x7, 0x80, 0x5, 0x5, 0x10000, 0x4, 0x7, 0x8, 0x3, 0x4, 0x8, 0x101, 0xfffffff8, 0x9, 0x0, 0x5, 0x3, 0x800, 0x1, 0x200, 0x5, 0xffff, 0x8, 0x1, 0x5, 0xf1, 0x6, 0x6, 0x8001, 0x3, 0x7cf7cf43, 0x6, 0x8, 0x5, 0x3, 0x1, 0x8, 0xfffffffd, 0x4, 0x16, 0x100]}, 0x45c)
syz_read_part_table(0x0, 0xaaaaaaaaaaaac47, &(0x7f0000000080)=[{&(0x7f0000000000)="020181ffffff0a000000ff0700000000000063000800000000000000004000ffffff85000000e1000000887700720030b5829237c30000000000008000da55aa", 0x40, 0x1c0}])

03:43:31 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a}], 0x5, 0x0)

[  793.819107][T10633] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:31 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:31 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601004c6c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  793.977414][T10657] EXT4-fs (loop1): VFS: Can't find ext4 filesystem
[  793.987324][T10646] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  794.010129][T10650] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  794.039023][T10650] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  794.073340][T10650] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:31 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60005006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:31 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:31 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60105006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:31 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a}], 0x5, 0x0)

[  794.239397][T10667] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  794.240382][T10655]  loop5: p1 p2 p3 < > p4
[  794.324923][T10667] EXT4-fs (loop0): #clusters per group too big: 16384
[  794.351467][T10655] loop5: p2 size 1073741824 extends beyond EOD, truncated
03:43:31 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  794.371057][T10655] loop5: p4 size 3657465856 extends beyond EOD, truncated
03:43:31 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601005c6c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  794.399259][T10676] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  794.482681][T10687] EXT4-fs (loop1): VFS: Can't find ext4 filesystem
[  794.490526][T10685] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:31 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:31 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60006006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  794.565451][T10685] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  794.593808][T10685] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:31 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a}], 0x5, 0x0)

03:43:31 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60106006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:31 executing program 5:
r0 = socket(0x200000000000011, 0x4000000000080002, 0x0)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00', <r1=>0x0})
bind$packet(r0, &(0x7f0000000140)={0x11, 0xc, r1, 0x1, 0x0, 0x6, @link_local}, 0x14)
sendmmsg(r0, &(0x7f0000000d00), 0x1c4, 0x0)
recvmmsg(r0, &(0x7f00000074c0)=[{{&(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/251, 0xfb}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000240)=""/97, 0x61}, {&(0x7f00000001c0)=""/19, 0x13}], 0x4, &(0x7f0000000300)=""/224, 0xe0}, 0xc9}, {{&(0x7f0000000400)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000480)=""/217, 0xd9}, {&(0x7f0000000600)=""/62, 0x3e}, {&(0x7f0000000640)=""/138, 0x8a}, {&(0x7f0000000700)=""/67, 0x43}, {&(0x7f0000000780)=""/195, 0xc3}, {&(0x7f0000000880)=""/243, 0xf3}, {&(0x7f0000000980)=""/51, 0x33}], 0x7, &(0x7f0000000a80)=""/161, 0xa1}}, {{&(0x7f0000000b40)=@isdn, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000000bc0)=""/119, 0x77}], 0x1, &(0x7f0000000d00)=""/177, 0xb1}, 0x8ef4}, {{&(0x7f0000000dc0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000004100)=[{&(0x7f0000000e40)=""/2, 0x2}, {&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/146, 0x92}, {&(0x7f0000001f40)=""/125, 0x7d}, {&(0x7f0000001fc0)=""/4096, 0x1000}, {&(0x7f0000002fc0)=""/30, 0x1e}, {&(0x7f0000003000)=""/4096, 0x1000}, {&(0x7f0000004000)=""/235, 0xeb}], 0x8, &(0x7f0000004180)=""/106, 0x6a}, 0xff}, {{&(0x7f0000004200)=@pppol2tpv3in6={0x18, 0x1, {0x0, <r2=>0xffffffffffffffff}}, 0x80, &(0x7f00000054c0)=[{&(0x7f0000004280)=""/104, 0x68}, {&(0x7f0000004300)=""/59, 0x3b}, {&(0x7f0000004340)=""/4096, 0x1000}, {&(0x7f0000005340)=""/184, 0xb8}, {&(0x7f0000005400)=""/161, 0xa1}], 0x5, &(0x7f0000005540)=""/3, 0x3}, 0xfff}, {{&(0x7f0000005580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f00000059c0)=[{&(0x7f0000005600)=""/54, 0x36}, {&(0x7f0000005640)=""/52, 0x34}, {&(0x7f0000005680)=""/180, 0xb4}, {&(0x7f0000005740)=""/135, 0x87}, {&(0x7f0000005800)}, {&(0x7f0000005840)=""/140, 0x8c}, {&(0x7f0000005900)=""/187, 0xbb}], 0x7}, 0x3f}, {{&(0x7f0000005a40)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006e00)=[{&(0x7f0000005ac0)=""/42, 0x2a}, {&(0x7f0000005b00)=""/43, 0x2b}, {&(0x7f0000005b40)=""/252, 0xfc}, {&(0x7f0000005c40)=""/97, 0x61}, {&(0x7f0000005cc0)=""/56, 0x38}, {&(0x7f0000005d00)=""/4096, 0x1000}, {&(0x7f0000006d00)=""/109, 0x6d}, {&(0x7f0000006d80)=""/85, 0x55}], 0x8, &(0x7f0000006e80)=""/78, 0x4e}, 0x6}, {{&(0x7f0000006f00)=@l2, 0x80, &(0x7f0000007080)=[{&(0x7f0000006f80)=""/197, 0xc5}], 0x1, &(0x7f00000070c0)=""/147, 0x93}}, {{&(0x7f0000007180)=@sco, 0x80, &(0x7f0000007440)=[{&(0x7f0000007200)=""/16, 0x10}, {&(0x7f0000007240)=""/72, 0x48}, {&(0x7f00000072c0)=""/25, 0x19}, {&(0x7f0000007300)=""/39, 0x27}, {&(0x7f0000007340)=""/224, 0xe0}], 0x5}, 0x3}], 0x9, 0x3112594fdf27a24f, &(0x7f0000007700)={0x77359400})
setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000007740)={0x83}, 0x4)
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}, {}]}, 0x44, 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

[  794.802796][T10701] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:32 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, 0x0, 0x0)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  794.881202][T10701] EXT4-fs (loop0): #clusters per group too big: 16384
[  794.920753][T10709] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  794.983118][T10725] EXT4-fs (loop1): VFS: Can't find ext4 filesystem
[  795.046931][T10723] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  795.093571][T10723] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:43:32 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6a521006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:32 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100606c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:32 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0)

03:43:32 executing program 5:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x6}, [], {}, [{}, {}, {0x8, 0x2}, {}], {0x10, 0x4}}, 0x44, 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

[  795.140433][T10723] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:32 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, 0x0, 0x0)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:32 executing program 5:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x6}, [], {}, [{}, {}, {0x8, 0x2}, {}], {0x10, 0x4}}, 0x44, 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

[  795.307677][T10744] EXT4-fs (loop1): bad geometry: block count 1080 exceeds size of device (1 blocks)
03:43:32 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60107006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  795.348800][T10751] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  795.373229][T10751] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:32 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0)

03:43:32 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, 0x0, 0x0)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  795.425278][T10750] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:32 executing program 5:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x6}, [], {}, [{}, {}, {0x8, 0x2}, {}], {0x10, 0x4}}, 0x44, 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

03:43:32 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100686c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  795.632254][T10767] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  795.659280][T10767] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  795.678637][T10767] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:32 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6dd21006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:32 executing program 5:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x6}, [], {}, [{}, {}, {0x8, 0x2}, {}], {0x10, 0x4}}, 0x44, 0x0)

03:43:32 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0), 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  795.724479][T10779] EXT4-fs (loop1): bad geometry: block count 1080 exceeds size of device (1 blocks)
[  795.881762][T10785] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  795.912039][T10789] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:33 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60108006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:33 executing program 1:
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00')
getdents64(r0, &(0x7f0000000080)=""/83, 0x39f)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999553c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0)

[  795.929097][T10785] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:33 executing program 5:
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x6}, [], {}, [{}, {}, {0x8, 0x2}, {}], {0x10, 0x4}}, 0x44, 0x0)

03:43:33 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0), 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:33 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6f925006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:33 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601006c6c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  796.124112][T10805] EXT4-fs (loop1): bad geometry: block count 1080 exceeds size of device (1 blocks)
03:43:33 executing program 5:
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x6}, [], {}, [{}, {}, {0x8, 0x2}, {}], {0x10, 0x4}}, 0x44, 0x0)

03:43:33 executing program 1:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}, {}]}, 0x44, 0x0)
r0 = socket(0x200000000000011, 0x4000000000080002, 0x0)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00', <r1=>0x0})
setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f00000000c0)={0x3, 0x3ff, 0x7}, 0x10)
bind$packet(r0, &(0x7f0000000140)={0x11, 0xc, r1, 0x1, 0x0, 0x6, @link_local}, 0x14)
sendmmsg(r0, &(0x7f0000000d00), 0x1c4, 0x0)
setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4)
pipe2(&(0x7f0000000080)={0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$capi20_data(r2, &(0x7f0000000140)={{0x10}}, 0x12)
ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f0000000040)=""/14)
rmdir(&(0x7f0000000200)='./file1\x00')

[  796.270142][T10811] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  796.295335][T10815] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  796.312385][T10811] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:43:33 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0), 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:33 executing program 5:
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x6}, [], {}, [{}, {}, {0x8, 0x2}, {}], {0x10, 0x4}}, 0x44, 0x0)

[  796.363505][T10811] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  796.442128][T10820] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  796.474535][T10820] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:33 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:33 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60109006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:33 executing program 5:
mkdir(0x0, 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x6}, [], {}, [{}, {}, {0x8, 0x2}, {}], {0x10, 0x4}}, 0x44, 0x0)

03:43:33 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60426006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:33 executing program 1:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}, {}]}, 0x44, 0x0)
r0 = socket(0x200000000000011, 0x4000000000080002, 0x0)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00', <r1=>0x0})
setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f00000000c0)={0x3, 0x3ff, 0x7}, 0x10)
bind$packet(r0, &(0x7f0000000140)={0x11, 0xc, r1, 0x1, 0x0, 0x6, @link_local}, 0x14)
sendmmsg(r0, &(0x7f0000000d00), 0x1c4, 0x0)
setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4)
pipe2(&(0x7f0000000080)={0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$capi20_data(r2, &(0x7f0000000140)={{0x10}}, 0x12)
ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f0000000040)=""/14)
rmdir(&(0x7f0000000200)='./file1\x00')

03:43:33 executing program 5:
mkdir(0x0, 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x6}, [], {}, [{}, {}, {0x8, 0x2}, {}], {0x10, 0x4}}, 0x44, 0x0)

03:43:33 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100746c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  796.797664][T10846] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:34 executing program 5:
mkdir(0x0, 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x6}, [], {}, [{}, {}, {0x8, 0x2}, {}], {0x10, 0x4}}, 0x44, 0x0)

[  796.852148][T10846] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  796.874098][T10854] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  796.893079][T10846] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:34 executing program 1:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}, {}]}, 0x44, 0x0)
r0 = socket(0x200000000000011, 0x4000000000080002, 0x0)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00', <r1=>0x0})
setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f00000000c0)={0x3, 0x3ff, 0x7}, 0x10)
bind$packet(r0, &(0x7f0000000140)={0x11, 0xc, r1, 0x1, 0x0, 0x6, @link_local}, 0x14)
sendmmsg(r0, &(0x7f0000000d00), 0x1c4, 0x0)
setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4)
pipe2(&(0x7f0000000080)={0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$capi20_data(r2, &(0x7f0000000140)={{0x10}}, 0x12)
ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f0000000040)=""/14)
rmdir(&(0x7f0000000200)='./file1\x00')

03:43:34 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6006c006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  797.011911][T10864] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  797.039036][T10864] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:34 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6010a006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:34 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60102776c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  797.244701][T10882] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  797.331406][T10889] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  797.349541][T10886] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  797.370145][T10889] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:34 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:34 executing program 5:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(0x0, &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x6}, [], {}, [{}, {}, {0x8, 0x2}, {}], {0x10, 0x4}}, 0x44, 0x0)

03:43:34 executing program 1:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}, {}]}, 0x44, 0x0)
r0 = socket(0x200000000000011, 0x4000000000080002, 0x0)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00', <r1=>0x0})
setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f00000000c0)={0x3, 0x3ff, 0x7}, 0x10)
bind$packet(r0, &(0x7f0000000140)={0x11, 0xc, r1, 0x1, 0x0, 0x6, @link_local}, 0x14)
sendmmsg(r0, &(0x7f0000000d00), 0x1c4, 0x0)
setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4)
pipe2(&(0x7f0000000080)={0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$capi20_data(r2, &(0x7f0000000140)={{0x10}}, 0x12)
rmdir(&(0x7f0000000200)='./file1\x00')

03:43:34 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6006d006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  797.379294][T10886] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  797.409926][T10886] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:34 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601007a6c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:34 executing program 5:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(0x0, &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x6}, [], {}, [{}, {}, {0x8, 0x2}, {}], {0x10, 0x4}}, 0x44, 0x0)

03:43:34 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6010b006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:34 executing program 1:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}, {}]}, 0x44, 0x0)
r0 = socket(0x200000000000011, 0x4000000000080002, 0x0)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00', <r1=>0x0})
setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f00000000c0)={0x3, 0x3ff, 0x7}, 0x10)
bind$packet(r0, &(0x7f0000000140)={0x11, 0xc, r1, 0x1, 0x0, 0x6, @link_local}, 0x14)
sendmmsg(r0, &(0x7f0000000d00), 0x1c4, 0x0)
setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4)
pipe2(&(0x7f0000000080), 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

[  797.731662][T10907] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:34 executing program 5:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(0x0, &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x6}, [], {}, [{}, {}, {0x8, 0x2}, {}], {0x10, 0x4}}, 0x44, 0x0)

03:43:35 executing program 1:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}, {}]}, 0x44, 0x0)
r0 = socket(0x200000000000011, 0x4000000000080002, 0x0)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00', <r1=>0x0})
setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f00000000c0)={0x3, 0x3ff, 0x7}, 0x10)
bind$packet(r0, &(0x7f0000000140)={0x11, 0xc, r1, 0x1, 0x0, 0x6, @link_local}, 0x14)
sendmmsg(r0, &(0x7f0000000d00), 0x1c4, 0x0)
setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4)
rmdir(&(0x7f0000000200)='./file1\x00')

[  797.825521][T10914] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  797.862904][T10914] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:35 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6009b006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  797.900716][T10924] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  797.917949][T10924] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:43:35 executing program 5:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', 0x0, &(0x7f0000000c40)={{}, {0x1, 0x6}, [], {}, [{}, {}, {0x8, 0x2}, {}], {0x10, 0x4}}, 0x44, 0x0)

[  797.953338][T10924] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  798.121525][T10942] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:35 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:35 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6010c006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:35 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60101886c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:35 executing program 1:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}, {}]}, 0x44, 0x0)
r0 = socket(0x200000000000011, 0x4000000000080002, 0x0)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00', <r1=>0x0})
setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f00000000c0)={0x3, 0x3ff, 0x7}, 0x10)
bind$packet(r0, &(0x7f0000000140)={0x11, 0xc, r1, 0x1, 0x0, 0x6, @link_local}, 0x14)
sendmmsg(r0, &(0x7f0000000d00), 0x1c4, 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

03:43:35 executing program 5:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', 0x0, &(0x7f0000000c40)={{}, {0x1, 0x6}, [], {}, [{}, {}, {0x8, 0x2}, {}], {0x10, 0x4}}, 0x44, 0x0)

03:43:35 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6009c006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:35 executing program 5:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', 0x0, &(0x7f0000000c40)={{}, {0x1, 0x6}, [], {}, [{}, {}, {0x8, 0x2}, {}], {0x10, 0x4}}, 0x44, 0x0)

[  798.460388][T10959] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  798.486609][T10959] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  798.502061][T10963] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:35 executing program 5:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0)

[  798.526717][T10959] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:35 executing program 1:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}, {}]}, 0x44, 0x0)
r0 = socket(0x200000000000011, 0x4000000000080002, 0x0)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00', <r1=>0x0})
setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f00000000c0)={0x3, 0x3ff, 0x7}, 0x10)
bind$packet(r0, &(0x7f0000000140)={0x11, 0xc, r1, 0x1, 0x0, 0x6, @link_local}, 0x14)
rmdir(&(0x7f0000000200)='./file1\x00')

[  798.599403][T10961] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  798.635803][T10961] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:35 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6010d006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:35 executing program 5:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0)

03:43:35 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60102006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  798.914864][T10990] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  798.924390][T10991] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  798.931819][T10990] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  798.946872][T10990] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  799.085968][T11002] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:36 executing program 1:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}, {}]}, 0x44, 0x0)
r0 = socket(0x200000000000011, 0x4000000000080002, 0x0)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00'})
setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f00000000c0)={0x3, 0x3ff, 0x7}, 0x10)
rmdir(&(0x7f0000000200)='./file1\x00')

03:43:36 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100fc6c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:36 executing program 5:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0)

03:43:36 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6010e006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:36 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x0, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:36 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60103006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:36 executing program 1:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}, {}]}, 0x44, 0x0)
r0 = socket(0x200000000000011, 0x4000000000080002, 0x0)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00'})
rmdir(&(0x7f0000000200)='./file1\x00')

03:43:36 executing program 5:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {0x8, 0x2}, {}], {0x10, 0x4}}, 0x44, 0x0)

[  799.392172][T11017] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  799.410468][T11017] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  799.440715][T11013] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  799.470760][T11018] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  799.488644][T11017] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:36 executing program 5:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {0x8, 0x2}, {}], {0x10, 0x4}}, 0x44, 0x0)

03:43:36 executing program 1:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}, {}]}, 0x44, 0x0)
socket(0x200000000000011, 0x4000000000080002, 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

[  799.525052][T11013] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:36 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60110006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:36 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60104006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:36 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6010fff6c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:36 executing program 5:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {0x8, 0x2}, {}], {0x10, 0x4}}, 0x44, 0x0)

03:43:36 executing program 1:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}, {}]}, 0x44, 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

[  799.861425][T11046] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:37 executing program 1:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

[  799.909654][T11046] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  799.945068][T11046] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  799.945106][T11052] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  799.977977][T11052] EXT4-fs (loop0): #clusters per group too big: 16384
[  800.031314][T11048] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:37 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x0, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:37 executing program 5:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x6}, [], {}, [{}, {}, {0x8, 0x2}], {0x10, 0x4}}, 0x3c, 0x0)

03:43:37 executing program 1:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

03:43:37 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60111006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:37 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100000a000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:37 executing program 1:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

03:43:37 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60105006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:37 executing program 5:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x6}, [], {}, [{}, {}, {0x8, 0x2}], {0x10, 0x4}}, 0x3c, 0x0)

[  800.322557][T11079] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  800.390824][T11080] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  800.409093][T11079] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  800.422425][T11080] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:37 executing program 1:
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}, {}]}, 0x44, 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

03:43:37 executing program 5:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x6}, [], {}, [{}, {}, {0x8, 0x2}], {0x10, 0x4}}, 0x3c, 0x0)

[  800.464946][T11079] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:37 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601000020000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  800.569957][T11096] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:37 executing program 5:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x6}, [], {}, [{}, {}, {}], {0x10, 0x4}}, 0x3c, 0x0)

[  800.732380][T11108] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  800.786331][T11108] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:38 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x0, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:38 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60112006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:38 executing program 1:
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}, {}]}, 0x44, 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

03:43:38 executing program 5:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x6}, [], {}, [{}, {}, {}], {0x10, 0x4}}, 0x3c, 0x0)

03:43:38 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60106006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:38 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601000023000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:38 executing program 1:
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}, {}]}, 0x44, 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

03:43:38 executing program 5:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x6}, [], {}, [{}, {}, {}], {0x10, 0x4}}, 0x3c, 0x0)

[  801.246928][T11132] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  801.266319][T11133] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  801.304674][T11132] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  801.339068][T11133] EXT4-fs (loop0): #clusters per group too big: 16384
[  801.350541][T11129] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  801.362493][T11132] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:38 executing program 1:
mkdir(0x0, 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}, {}]}, 0x44, 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

03:43:38 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601000025000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:38 executing program 5:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x6}, [], {}, [{}, {}, {}, {}], {0x10, 0x4}}, 0x44, 0x0)

03:43:38 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60125006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  801.717146][T11163] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  801.726813][T11163] EXT4-fs (loop0): #clusters per group too big: 16384
[  801.740332][T11165] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  801.751769][T11165] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  801.761569][T11165] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:39 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, 0x0)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:39 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60107006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:39 executing program 5:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x6}, [], {}, [{}, {}, {}, {}], {0x10, 0x4}}, 0x44, 0x0)

03:43:39 executing program 1:
mkdir(0x0, 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}, {}]}, 0x44, 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

03:43:39 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100002a000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:39 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6012d006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:39 executing program 1:
mkdir(0x0, 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}, {}]}, 0x44, 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

03:43:39 executing program 5:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x6}, [], {}, [{}, {}, {}, {}], {0x10, 0x4}}, 0x44, 0x0)

[  802.183551][T11187] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  802.210556][T11183] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  802.224836][T11184] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  802.282580][T11183] EXT4-fs (loop0): #clusters per group too big: 16384
[  802.291189][T11184] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:43:39 executing program 1:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(0x0, &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}, {}]}, 0x44, 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

03:43:39 executing program 5:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x6}, [], {}, [{}, {0x8, 0x2}, {}], {0x10, 0x4}}, 0x3c, 0x0)

03:43:39 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60108006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  802.335919][T11184] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:39 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100002b000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  802.610796][T11213] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  802.645728][T11219] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  802.664752][T11219] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:40 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, 0x0)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:40 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6012f006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:40 executing program 1:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(0x0, &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}, {}]}, 0x44, 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

03:43:40 executing program 5:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x6}, [], {}, [{}, {0x8, 0x2}, {}], {0x10, 0x4}}, 0x3c, 0x0)

03:43:40 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60109006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:40 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100002d000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:40 executing program 1:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(0x0, &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}, {}]}, 0x44, 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

03:43:40 executing program 5:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x6}, [], {}, [{}, {0x8, 0x2}, {}], {0x10, 0x4}}, 0x3c, 0x0)

[  803.063931][T11237] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  803.104262][T11234] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  803.116921][T11236] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  803.129061][T11237] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  803.139130][T11234] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:40 executing program 1:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', 0x0, &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}, {}]}, 0x44, 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

03:43:40 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100002e000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  803.154634][T11237] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:40 executing program 5:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x6}, [], {}, [{}, {0x8, 0x2}, {}], {0x10, 0x4}}, 0x3c, 0x0)

03:43:40 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60148006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  803.409893][T11265] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  803.427680][T11265] EXT4-fs (loop0): #clusters per group too big: 16384
[  803.484051][T11268] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  803.508331][T11268] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  803.517114][T11268] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:40 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, 0x0)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:40 executing program 1:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', 0x0, &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}, {}]}, 0x44, 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

03:43:40 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6010a006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:40 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100002f000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:40 executing program 5:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x6}, [], {}, [{}, {0x8, 0x2}, {}], {0x10, 0x4}}, 0x3c, 0x0)

03:43:40 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6014c006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:41 executing program 5:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x6}, [], {}, [{}, {0x8, 0x2}, {}], {0x10, 0x4}}, 0x3c, 0x0)

03:43:41 executing program 1:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', 0x0, &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}, {}]}, 0x44, 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

[  803.923289][T11289] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  803.962661][T11289] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  803.971455][T11289] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  804.027919][T11286] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:41 executing program 5:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x6}, [], {}, [{}, {}, {0x8, 0x2}, {}]}, 0x44, 0x0)

03:43:41 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6015c006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:41 executing program 1:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

[  804.068498][T11286] EXT4-fs (loop0): #clusters per group too big: 16384
[  804.091056][T11287] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:41 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601000030000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  804.393679][T11319] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  804.418518][T11319] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  804.438391][T11319] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  804.453228][T11321] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  804.462643][T11321] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:41 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280))
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:41 executing program 5:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x6}, [], {}, [{}, {}, {0x8, 0x2}, {}]}, 0x44, 0x0)

03:43:41 executing program 1:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

03:43:41 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6010b006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:41 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601000048000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:41 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60160006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:41 executing program 1:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

03:43:41 executing program 5:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x6}, [], {}, [{}, {}, {0x8, 0x2}, {}]}, 0x44, 0x0)

[  804.863027][T11341] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:42 executing program 5:
r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x82, 0x0)
io_setup(0x9, &(0x7f0000000100)=<r1=>0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r2=>0xffffffffffffffff})
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
io_submit(r1, 0x0, 0x0)
io_submit(r1, 0xc3, &(0x7f0000000440)=[&(0x7f0000000000)={0x4, 0x960000, 0x0, 0x1, 0x0, r0, &(0x7f00000001c0)="1000004006ffffffffff600000000000b22025285db74192e7576d9062ec6e2fe8ffff3ff248691861d03a71091d334252afb1af5b8f0274c2ed58338226131291198f3d70dcf797ac42d0eeed042c06b56b89f02f92b12ebe4c45948a362a76def2f4955f100a13131f474b140942110257e173cea102775e1b3873ebf98dac6421f6d449544114b8ce29f4b48d1738b5be127a96f24c9d3c130e1a6c2eb5b3f12eb6a1f5051594545cbb895e65d83c08d2d6cd56694e5a6c00f54aceaf498f57b2a56634a23ae7", 0x40000010}])

[  804.955558][T11342] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  804.964860][T11341] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  804.964878][T11341] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:42 executing program 1:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}]}, 0x3c, 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

[  805.018427][T11342] EXT4-fs (loop0): #clusters per group too big: 16384
[  805.029071][T11339] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:42 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100004c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:42 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7')
sendfile(r0, r0, 0x0, 0xdd)

[  805.331657][T11367] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  805.357276][T11367] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:42 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280))
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:42 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60168006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:42 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6010c006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:42 executing program 5:
r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x3f553e5)
clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
link(&(0x7f0000000240)='./file0\x00', &(0x7f00000003c0)='./file1\x00')
setxattr$security_smack_entry(&(0x7f0000000040)='./file3\x00', 0x0, 0x0, 0xfffffffffffffe0f, 0x0)

03:43:42 executing program 1:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}]}, 0x3c, 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

03:43:42 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601000058000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:42 executing program 1:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}]}, 0x3c, 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

[  805.749066][T11389] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  805.779092][T11387] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  805.796085][T11389] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:43 executing program 1:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}]}, 0x3c, 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

[  805.920670][T11388] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  805.942147][T11388] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  805.951633][T11388] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:43 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6010d006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:43 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100005c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:43 executing program 1:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}]}, 0x3c, 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

03:43:43 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6016c006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  806.235418][T11416] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  806.247136][T11419] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  806.278486][T11419] EXT4-fs (loop0): #clusters per group too big: 16384
[  806.391332][T11426] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  806.429183][T11426] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  806.437379][T11426] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:43 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280))
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:43 executing program 1:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}]}, 0x3c, 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

03:43:43 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601000068000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  806.621261][T11442] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  806.632884][T11442] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:43 executing program 5:
r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0)
mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb383c000)
r1 = mq_open(&(0x7f0000000000)=',\x00', 0x0, 0x0, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
r5 = dup(r2)
sendfile(r5, r1, 0x0, 0x5)

03:43:43 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6010e006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:43 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60174006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:43 executing program 1:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}]}, 0x3c, 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

03:43:43 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100026c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  806.868606][T11456] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  806.892254][T11456] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:44 executing program 1:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}]}, 0x3c, 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

[  806.915453][T11457] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  806.928662][T11457] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:43:44 executing program 5:
r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0)
ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x2, 0x0, &(0x7f0000000180)=[@request_death={0x40086303}], 0x0, 0x0, 0x0})

03:43:44 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100036c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  806.980719][T11457] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  807.010231][T11455] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:44 executing program 1:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}]}, 0x3c, 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

[  807.225028][T11476] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  807.244436][T11476] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:44 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:44 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6017a006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:44 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60110006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:44 executing program 1:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}]}, 0x3c, 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

03:43:44 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100046c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:44 executing program 5:
r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r1 = fcntl$dupfd(r0, 0x0, r0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$bt_rfcomm(r1, &(0x7f00000000c0)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}}, 0xa)

03:43:44 executing program 1:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}]}, 0x3c, 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

[  807.546303][T11494] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  807.584798][T11494] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  807.585390][T11498] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:44 executing program 5:
mkdir(&(0x7f00000013c0)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tmpfs\x00', 0x0, 0x0)
chdir(&(0x7f0000000440)='./file0\x00')
mkdir(&(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0)
r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x0)

[  807.627715][T11494] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  807.664015][T11501] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:44 executing program 1:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}]}, 0x3c, 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

[  807.694756][T11501] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:44 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601fc006c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:45 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100056c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:45 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60111006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:45 executing program 5:

03:43:45 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:45 executing program 1:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}, {}]}, 0x44, 0x0)
rmdir(0x0)

[  808.068789][T11526] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:45 executing program 5:

03:43:45 executing program 1:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}, {}]}, 0x44, 0x0)
rmdir(0x0)

[  808.148610][T11526] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  808.167130][T11529] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  808.197618][T11526] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  808.220523][T11533] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:45 executing program 5:

[  808.254584][T11529] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:45 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6019e016c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:45 executing program 1:
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}, {}]}, 0x44, 0x0)
rmdir(0x0)

03:43:45 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100066c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:45 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:45 executing program 1:

03:43:45 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60112006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:45 executing program 5:

03:43:45 executing program 1:
syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00')
preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x333, 0x0)
perf_event_open(&(0x7f0000000200)={0x2, 0x7ff, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00')
syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00')
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x3, 0x3c)
pipe(&(0x7f0000000040)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
fcntl$dupfd(r0, 0x0, 0xffffffffffffffff)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
sendfile(r2, r3, 0x0, 0x320f)
r4 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x80)
ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f00000002c0)={0x1, r4})
openat(r2, &(0x7f00000001c0)='./file0\x00', 0x101400, 0x0)
accept$alg(r2, 0x0, 0x0)
r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0)
r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
bind$bt_rfcomm(r6, &(0x7f0000000540)={0x1f, {0x0, 0x0, 0x7, 0x0, 0x0, 0x11}}, 0xa)
ioctl$TIOCNOTTY(r6, 0x5422)
ioctl$ASHMEM_SET_NAME(r5, 0x41007701, &(0x7f0000000140)='fdinfo/3\x00')
writev(r1, 0x0, 0x0)

[  808.720243][T11563] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:45 executing program 5:

[  808.785047][T11563] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  808.802418][T11563] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  808.875218][T11575] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  808.892499][T11575] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:46 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60104026c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  808.921960][T11578] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:46 executing program 5:

03:43:46 executing program 1:

03:43:46 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, 0x0, 0x0)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:46 executing program 5:

03:43:46 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100076c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:46 executing program 1:

[  809.300393][T11601] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:46 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60125006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  809.367320][T11601] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:43:46 executing program 5:

03:43:46 executing program 1:
socket$kcm(0x10, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0)
close(r0)
close(r1)
getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000300), &(0x7f0000000340)=0x40)
pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00')
socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040))
bpf$OBJ_PIN_MAP(0x6, 0x0, 0xffffffffffffff1c)
write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$kcm(0xa, 0x922000000003, 0x11)
recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0xd01, 0x54}, 0x0)
close(0xffffffffffffffff)

[  809.422487][T11601] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  809.553882][T11611] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:46 executing program 5:

03:43:46 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60161026c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  809.608528][T11611] EXT4-fs (loop0): #clusters per group too big: 16384
[  809.624697][T11617] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:46 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100086c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:46 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, 0x0, 0x0)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:47 executing program 5:

03:43:47 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6012d006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  809.912935][T11636] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  809.929511][T11636] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  809.961765][T11632] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  809.981241][T11636] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  809.994886][T11632] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:47 executing program 5:

03:43:47 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100036c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:47 executing program 5:

03:43:47 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100096c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  810.134555][T11648] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:47 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60148006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  810.340733][T11656] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:47 executing program 1:

03:43:47 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, 0x0, 0x0)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:47 executing program 5:

[  810.402843][T11656] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  810.473768][T11656] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  810.483772][T11663] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:47 executing program 5:

03:43:47 executing program 1:

[  810.543005][T11663] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:47 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60102046c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:47 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601000a6c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  810.708508][T11677] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:47 executing program 1:

03:43:47 executing program 5:

[  810.861227][T11684] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  810.871557][T11684] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  810.913984][T11684] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:48 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6014c006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:48 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:48 executing program 1:

03:43:48 executing program 5:

03:43:48 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601000b6c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:48 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60106046c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  811.084986][T11697] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  811.094769][T11697] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:48 executing program 1:

03:43:48 executing program 5:

[  811.242545][T11707] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:48 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:48 executing program 1:

03:43:48 executing program 5:

03:43:48 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6015c006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  811.427019][T11721] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  811.443446][T11716] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:48 executing program 5:

03:43:48 executing program 1:

03:43:48 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  811.497534][T11721] EXT4-fs (loop0): #clusters per group too big: 16384
[  811.506603][T11716] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  811.527281][T11716] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:48 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601000c6c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:48 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60110046c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:48 executing program 5:

03:43:48 executing program 1:

03:43:49 executing program 5:

03:43:49 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:49 executing program 1:

[  811.866370][T11750] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  811.899102][T11763] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  811.908262][T11763] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  811.950581][T11763] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  811.990648][T11762] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:49 executing program 1:

[  812.017699][T11762] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:49 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60160006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:49 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:49 executing program 5:

03:43:49 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100056c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:49 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601000d6c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:49 executing program 1:

03:43:49 executing program 5:

03:43:49 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:49 executing program 1:

[  812.395604][T11796] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:49 executing program 5:

[  812.459042][T11790] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:49 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:49 executing program 1:

[  812.522452][T11790] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:43:49 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60168006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:49 executing program 5:

[  812.587083][T11798] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  812.613475][T11790] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:49 executing program 1:

[  812.668117][T11798] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:49 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100066c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:50 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601000e6c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:50 executing program 5:

03:43:50 executing program 1:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
r0 = socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x11, &(0x7f00000003c0)=0x6, 0x4)

03:43:50 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  812.930018][T11828] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:50 executing program 5:
write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000001a00)={'syz0\x00', {0x0, 0x0, 0x1035}, 0x0, [0x200], [0x0, 0x0, 0x0, 0x1, 0x58ff0241, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x1f, 0x0, 0xffffffe1, 0x0, 0x0, 0x0, 0x0, 0x21d], [0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x4, 0x7, 0x200, 0x0, 0x3, 0x80000000, 0x8, 0x0, 0x6b, 0x4, 0xff, 0x0, 0x0, 0x1bb40000, 0x0, 0x0, 0x4, 0x0, 0x4, 0x2, 0x87a, 0x0, 0x0, 0x80000001, 0x2, 0x45ad, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffffff8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xffff, 0x0, 0xd9c, 0x0, 0xff, 0x8c7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x7a, 0x0, 0x6, 0xb9d, 0x0, 0x0, 0x2, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x6, 0xfff, 0x0, 0x0, 0xffff7fff, 0x0, 0x0, 0x0, 0x3, 0x910a, 0x0, 0x0, 0x0, 0x80000]}, 0x45c)
perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0)
write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x94}, {}, @quote}], 0xff33)

03:43:50 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:50 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6016c006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  813.067737][T11837] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  813.099750][T11837] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:43:50 executing program 1:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xc0, 0x0)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}})

[  813.138931][T11837] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  813.210614][T11847] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:50 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60104066c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:50 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, 0x0, 0x0)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  813.354737][T11847] EXT4-fs (loop0): #clusters per group too big: 16384
[  813.432186][T11864] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:50 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100106c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  813.598044][T11873] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  813.619446][T11873] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:43:50 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60174006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  813.648730][T11873] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:50 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, 0x0, 0x0)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:50 executing program 5:
write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000001a00)={'syz0\x00', {0x0, 0x0, 0x1035}, 0x0, [0x200], [0x0, 0x0, 0x0, 0x1, 0x58ff0241, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x1f, 0x0, 0xffffffe1, 0x0, 0x0, 0x0, 0x0, 0x21d], [0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x4, 0x7, 0x200, 0x0, 0x3, 0x80000000, 0x8, 0x0, 0x6b, 0x4, 0xff, 0x0, 0x0, 0x1bb40000, 0x0, 0x0, 0x4, 0x0, 0x4, 0x2, 0x87a, 0x0, 0x0, 0x80000001, 0x2, 0x45ad, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffffff8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xffff, 0x0, 0xd9c, 0x0, 0xff, 0x8c7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x7a, 0x0, 0x6, 0xb9d, 0x0, 0x0, 0x2, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x6, 0xfff, 0x0, 0x0, 0xffff7fff, 0x0, 0x0, 0x0, 0x3, 0x910a, 0x0, 0x0, 0x0, 0x80000]}, 0x45c)
perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0)
write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x94}, {}, @quote}], 0xff33)

[  813.763214][T11882] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:50 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100076c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  813.805438][T11885] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  813.824702][T11882] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:51 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, 0x0, 0x0)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:51 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100116c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:51 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6017a006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:51 executing program 1:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xc0, 0x0)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}})

[  814.117602][T11902] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  814.180090][T11902] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  814.204419][T11902] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:51 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:51 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100096c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  814.352346][T11914] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  814.371398][T11917] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  814.378082][T11914] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:51 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:51 executing program 5:
write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000001a00)={'syz0\x00', {0x0, 0x0, 0x1035}, 0x0, [0x200], [0x0, 0x0, 0x0, 0x1, 0x58ff0241, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x1f, 0x0, 0xffffffe1, 0x0, 0x0, 0x0, 0x0, 0x21d], [0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x4, 0x7, 0x200, 0x0, 0x3, 0x80000000, 0x8, 0x0, 0x6b, 0x4, 0xff, 0x0, 0x0, 0x1bb40000, 0x0, 0x0, 0x4, 0x0, 0x4, 0x2, 0x87a, 0x0, 0x0, 0x80000001, 0x2, 0x45ad, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffffff8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xffff, 0x0, 0xd9c, 0x0, 0xff, 0x8c7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x7a, 0x0, 0x6, 0xb9d, 0x0, 0x0, 0x2, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x6, 0xfff, 0x0, 0x0, 0xffff7fff, 0x0, 0x0, 0x0, 0x3, 0x910a, 0x0, 0x0, 0x0, 0x80000]}, 0x45c)
perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0)
write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x94}, {}, @quote}], 0xff33)

03:43:51 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100126c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:51 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6017d006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:51 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:51 executing program 5:
write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000001a00)={'syz0\x00', {0x0, 0x0, 0x1035}, 0x0, [0x200], [0x0, 0x0, 0x0, 0x1, 0x58ff0241, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x1f, 0x0, 0xffffffe1, 0x0, 0x0, 0x0, 0x0, 0x21d], [0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x4, 0x7, 0x200, 0x0, 0x3, 0x80000000, 0x8, 0x0, 0x6b, 0x4, 0xff, 0x0, 0x0, 0x1bb40000, 0x0, 0x0, 0x4, 0x0, 0x4, 0x2, 0x87a, 0x0, 0x0, 0x80000001, 0x2, 0x45ad, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffffff8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xffff, 0x0, 0xd9c, 0x0, 0xff, 0x8c7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x7a, 0x0, 0x6, 0xb9d, 0x0, 0x0, 0x2, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x6, 0xfff, 0x0, 0x0, 0xffff7fff, 0x0, 0x0, 0x0, 0x3, 0x910a, 0x0, 0x0, 0x0, 0x80000]}, 0x45c)
perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0)
write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x94}, {}, @quote}], 0xff33)

[  814.701082][T11936] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  814.756652][T11936] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:43:51 executing program 2:
pipe(&(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
write$binfmt_elf32(r0, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r0, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x100000000, 0x0)

[  814.840178][T11944] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  814.850233][T11936] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  814.886329][T11946] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:52 executing program 2:
pipe(&(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
write$binfmt_elf32(r0, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r0, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x100000000, 0x0)

[  814.937478][T11944] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:52 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601000a6c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:52 executing program 1:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xc0, 0x0)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}})

03:43:52 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100256c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:52 executing program 2:
pipe(&(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
write$binfmt_elf32(r0, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r0, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x100000000, 0x0)

03:43:52 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6019c016c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  815.301825][T11971] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  815.385940][T11971] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  815.408112][T11979] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:52 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0)

[  815.436467][T11971] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  815.466422][T11979] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:52 executing program 5:
accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0)
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0)
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0)
pipe(&(0x7f0000000200)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x0)
write(r3, &(0x7f0000000340), 0x41395527)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0)
ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, 0x0)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
getpeername$packet(0xffffffffffffffff, 0x0, 0x0)
dup(0xffffffffffffffff)
write$selinux_attr(0xffffffffffffffff, &(0x7f0000000180)='system_u:object_r:hugetlbfs_t:s0\x00', 0x5571)
ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000480)={{0x4, 0x7}, {0x4, 0x31}, 0x4, 0x0, 0x2d})
clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x8a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x8}, 0x200000000, 0x2, 0x1}, r0, 0x0, 0xffffffffffffffff, 0x2)
mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000))
r4 = socket$inet(0x10, 0x3, 0x0)
sendmsg$IPVS_CMD_GET_SERVICE(r4, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200020}, 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYRES16, @ANYBLOB="650a41a6cc5801edca2d67de6712a79053dacf95a85f5cc1b37bf4768faa2e41b1ae3572e5b5de6dec19496df9fe21303d42ad30cd4354259268a210a492fac293371378ff35da833722f5c8917c94e3fb4614bfbc4c0aee964ed7dd243c0c973ab3127b836accd874260df8d4511cb42b178166244dfd4d2aeae3"], 0x2}}, 0x20000000)
socket$inet_udp(0x2, 0x2, 0x0)

03:43:52 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601000b6c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:52 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601002d6c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  815.544798][T11985] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:52 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e6019d016c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:52 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0)

03:43:52 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280))
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  815.825315][T12003] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  815.839181][T12003] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  815.860158][T12003] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  815.889725][T12009] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  815.924228][T12009] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:53 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601000c6c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:53 executing program 1:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xc0, 0x0)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}})

03:43:53 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601002f6c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:53 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0)

[  816.118753][T12020] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:53 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x0, 0x0)

[  816.269948][T12028] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  816.307892][T12035] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:53 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60104026c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:53 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x0, 0x0)

[  816.354915][T12028] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  816.364822][T12035] EXT4-fs (loop0): #clusters per group too big: 16384
[  816.374415][T12028] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:53 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100486c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:53 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601000d6c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:53 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x0, 0x0)

[  816.583142][T12051] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  816.649785][T12057] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  816.699373][T12057] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:53 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60162026c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  816.813901][T12067] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:54 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x0, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:54 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, 0x0)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  816.859494][T12067] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  816.899006][T12067] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:54 executing program 1:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}})

03:43:54 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601004c6c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:54 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601000e6c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  817.041855][T12076] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  817.121755][T12092] 9pnet: Insufficient options for proto=fd
[  817.141474][T12088] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  817.159143][T12088] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:54 executing program 1:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}})

03:43:54 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60163026c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:54 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601005c6c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  817.282071][T12097] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  817.315065][T12103] 9pnet: Insufficient options for proto=fd
03:43:54 executing program 1:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}})

[  817.329911][T12097] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  817.348690][T12097] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  817.368136][T12105] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:54 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60104106c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:54 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100036c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  817.538435][T12115] 9pnet: Insufficient options for proto=fd
[  817.546814][T12109] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:54 executing program 1:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xc0, 0x0)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}})

[  817.610779][T12109] EXT4-fs (loop0): #clusters per group too big: 16384
[  817.737250][T12120] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  817.788935][T12120] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:43:55 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:55 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100606c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:55 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x0, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  817.831537][T12120] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  817.852545][T12126] EXT4-fs (loop4): filesystem too large to mount safely on this system
03:43:55 executing program 1:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xc0, 0x0)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}})

03:43:55 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60120106c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:55 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60102046c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:55 executing program 1:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xc0, 0x0)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}})

[  818.158329][T12144] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  818.187043][T12144] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:55 executing program 1:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xc0, 0x0)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}})

03:43:55 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100686c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  818.311474][T12152] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  818.323907][T12157] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  818.334245][T12152] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  818.346991][T12165] 9pnet: Insufficient options for proto=fd
[  818.364539][T12152] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:55 executing program 1:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xc0, 0x0)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}})

[  818.510743][T12170] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  818.542574][T12170] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:55 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100116c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:55 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60106046c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  818.576488][T12178] 9pnet: Insufficient options for proto=fd
[  818.781357][T12183] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  818.800078][T12186] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  818.806982][T12183] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
03:43:56 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:56 executing program 1:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xc0, 0x0)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}})

03:43:56 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601006c6c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:56 executing program 2 (fault-call:10 fault-nth:0):
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  818.843231][T12183] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:56 executing program 1:
pipe2$9p(0x0, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xc0, 0x0)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}})

[  818.911566][T12199] 9pnet: Insufficient options for proto=fd
[  818.928313][T12196] FAULT_INJECTION: forcing a failure.
[  818.928313][T12196] name failslab, interval 1, probability 0, space 0, times 0
[  818.948651][T12196] CPU: 0 PID: 12196 Comm: syz-executor.2 Not tainted 5.4.0-rc5+ #0
03:43:56 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60110046c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  818.956573][T12196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  818.966634][T12196] Call Trace:
[  818.969980][T12196]  dump_stack+0x1d8/0x2f8
[  818.974327][T12196]  should_fail+0x555/0x770
[  818.978768][T12196]  __should_failslab+0x11a/0x160
[  818.983786][T12196]  ? kzalloc+0x26/0x40
[  818.987844][T12196]  should_failslab+0x9/0x20
[  818.992340][T12196]  __kmalloc+0x7a/0x340
[  818.996473][T12196]  ? tls_sw_sendpage+0x33b/0x10d0
[  819.001476][T12196]  kzalloc+0x26/0x40
[  819.005347][T12196]  tls_get_rec+0xbf/0x510
[  819.009721][T12196]  ? local_bh_enable+0x1f/0x30
[  819.014466][T12196]  tls_sw_sendpage+0x378/0x10d0
[  819.019322][T12196]  ? trace_hardirqs_on_thunk+0x1a/0x20
[  819.024793][T12196]  ? retint_kernel+0x2b/0x2b
[  819.029376][T12196]  ? bpf_exec_tx_verdict+0x1010/0x1010
[  819.034907][T12196]  inet_sendpage+0x16d/0x340
[  819.039480][T12196]  ? trace_hardirqs_on_thunk+0x1a/0x20
[  819.044915][T12196]  ? inet_sendmsg+0x310/0x310
[  819.049571][T12196]  sock_sendpage+0xd3/0x120
[  819.054054][T12196]  pipe_to_sendpage+0x1f9/0x2a0
[  819.058896][T12196]  ? sock_fasync+0x100/0x100
[  819.063466][T12196]  __splice_from_pipe+0x2f7/0x8a0
[  819.068468][T12196]  ? generic_splice_sendpage+0x180/0x180
[  819.074083][T12196]  generic_splice_sendpage+0x114/0x180
[  819.079518][T12196]  ? iter_file_splice_write+0xe20/0xe20
[  819.085054][T12196]  __se_sys_splice+0x71a/0x1ac0
[  819.089899][T12196]  ? check_preemption_disabled+0xb7/0x2a0
[  819.095601][T12196]  ? debug_smp_processor_id+0x1c/0x20
[  819.100978][T12196]  ? fpregs_assert_state_consistent+0xb7/0xe0
[  819.107044][T12196]  __x64_sys_splice+0xe5/0x100
[  819.111787][T12196]  do_syscall_64+0xf7/0x1c0
[  819.116267][T12196]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  819.122137][T12196] RIP: 0033:0x459f49
[  819.126020][T12196] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  819.145614][T12196] RSP: 002b:00007fd7bc303c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113
[  819.154007][T12196] RAX: ffffffffffffffda RBX: 00007fd7bc303c90 RCX: 0000000000459f49
[  819.161957][T12196] RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003
[  819.169905][T12196] RBP: 000000000075bf20 R08: 0000000100000000 R09: 0000000000000000
[  819.177854][T12196] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd7bc3046d4
[  819.185802][T12196] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000006
03:43:56 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100126c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  819.259386][T12197] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
03:43:56 executing program 2 (fault-call:10 fault-nth:1):
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  819.308416][T12197] EXT4-fs (loop0): #clusters per group too big: 16384
[  819.308431][T12209] 9pnet: Insufficient options for proto=fd
03:43:56 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100746c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:56 executing program 1:
pipe2$9p(0x0, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xc0, 0x0)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}})

[  819.440301][T12206] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  819.489378][T12214] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  819.517620][T12214] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  819.529608][T12214] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  819.567590][T12218] FAULT_INJECTION: forcing a failure.
[  819.567590][T12218] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  819.580824][T12218] CPU: 0 PID: 12218 Comm: syz-executor.2 Not tainted 5.4.0-rc5+ #0
[  819.588708][T12218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
03:43:56 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100056c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  819.588749][T12218] Call Trace:
[  819.588770][T12218]  dump_stack+0x1d8/0x2f8
[  819.588785][T12218]  should_fail+0x555/0x770
[  819.588802][T12218]  should_fail_alloc_page+0x55/0x60
[  819.616045][T12218]  prepare_alloc_pages+0x283/0x460
[  819.621163][T12218]  __alloc_pages_nodemask+0xb2/0x5d0
[  819.626470][T12218]  ? lockdep_hardirqs_on+0x3c5/0x7d0
[  819.631763][T12218]  ? trace_hardirqs_on_thunk+0x1a/0x20
[  819.637232][T12218]  kmem_getpages+0x4d/0xa00
[  819.641749][T12218]  cache_grow_begin+0x7e/0x2c0
[  819.646519][T12218]  cache_alloc_refill+0x311/0x3f0
03:43:56 executing program 1:
pipe2$9p(0x0, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xc0, 0x0)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}})

[  819.651550][T12218]  ? check_preemption_disabled+0xb7/0x2a0
[  819.657274][T12218]  __kmalloc+0x318/0x340
[  819.661513][T12218]  ? kzalloc+0x26/0x40
[  819.665587][T12218]  kzalloc+0x26/0x40
[  819.665817][T12228] 9pnet: Insufficient options for proto=fd
[  819.669498][T12218]  tls_get_rec+0xbf/0x510
[  819.669511][T12218]  ? local_bh_enable+0x1f/0x30
[  819.669527][T12218]  tls_sw_sendpage+0x378/0x10d0
[  819.669546][T12218]  ? retint_kernel+0x2b/0x2b
[  819.669560][T12218]  ? trace_hardirqs_on_thunk+0x1a/0x20
[  819.669580][T12218]  ? retint_kernel+0x2b/0x2b
[  819.703850][T12218]  ? bpf_exec_tx_verdict+0x1010/0x1010
[  819.709300][T12218]  inet_sendpage+0x16d/0x340
[  819.713875][T12218]  ? inet_sendmsg+0x310/0x310
[  819.718535][T12218]  sock_sendpage+0xd3/0x120
[  819.723029][T12218]  pipe_to_sendpage+0x1f9/0x2a0
[  819.727979][T12218]  ? sock_fasync+0x100/0x100
[  819.732577][T12218]  __splice_from_pipe+0x2f7/0x8a0
[  819.737598][T12218]  ? generic_splice_sendpage+0x180/0x180
[  819.743222][T12218]  generic_splice_sendpage+0x114/0x180
[  819.748709][T12218]  ? iter_file_splice_write+0xe20/0xe20
[  819.754312][T12218]  __se_sys_splice+0x71a/0x1ac0
[  819.759181][T12218]  ? rcu_read_lock_sched_held+0x10b/0x170
[  819.764895][T12218]  ? __kasan_check_write+0x14/0x20
[  819.770003][T12218]  ? __fpregs_load_activate+0x195/0x220
[  819.775554][T12218]  ? switch_fpu_return+0xe/0x10
[  819.780398][T12218]  __x64_sys_splice+0xe5/0x100
[  819.785147][T12218]  do_syscall_64+0xf7/0x1c0
[  819.789636][T12218]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  819.795514][T12218] RIP: 0033:0x459f49
[  819.799404][T12218] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  819.819008][T12218] RSP: 002b:00007fd7bc303c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113
[  819.827420][T12218] RAX: ffffffffffffffda RBX: 00007fd7bc303c90 RCX: 0000000000459f49
[  819.835383][T12218] RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003
[  819.843343][T12218] RBP: 000000000075bf20 R08: 0000000100000000 R09: 0000000000000000
[  819.851302][T12218] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd7bc3046d4
[  819.859253][T12218] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000006
[  819.935976][T12232] 9pnet: Insufficient options for proto=fd
[  819.957575][T12224] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  819.992515][T12224] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:57 executing program 5 (fault-call:2 fault-nth:0):
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}, {}]}, 0x44, 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

03:43:57 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100206c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:57 executing program 2 (fault-call:10 fault-nth:2):
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

03:43:57 executing program 1:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(0x0, 0x0)
r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xc0, 0x0)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}})

03:43:57 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601007a6c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  820.147651][T12235] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  820.227488][T12253] FAULT_INJECTION: forcing a failure.
[  820.227488][T12253] name failslab, interval 1, probability 0, space 0, times 0
[  820.249122][T12253] CPU: 1 PID: 12253 Comm: syz-executor.5 Not tainted 5.4.0-rc5+ #0
[  820.257047][T12253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  820.267115][T12253] Call Trace:
[  820.270416][T12253]  dump_stack+0x1d8/0x2f8
03:43:57 executing program 1:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(0x0, 0x0)
r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xc0, 0x0)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}})

[  820.274759][T12253]  should_fail+0x555/0x770
[  820.279189][T12253]  __should_failslab+0x11a/0x160
[  820.284151][T12253]  ? getname_flags+0xba/0x640
[  820.288832][T12253]  should_failslab+0x9/0x20
[  820.293333][T12253]  kmem_cache_alloc+0x56/0x2e0
[  820.298100][T12253]  getname_flags+0xba/0x640
[  820.302615][T12253]  do_rmdir+0x3f/0x590
[  820.306701][T12253]  ? trace_irq_disable_rcuidle+0x23/0x1e0
[  820.306898][T12245] FAULT_INJECTION: forcing a failure.
[  820.306898][T12245] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  820.312414][T12253]  ? trace_hardirqs_on_thunk+0x1a/0x20
[  820.312425][T12253]  ? trace_irq_disable_rcuidle+0x23/0x1e0
[  820.312434][T12253]  ? do_syscall_64+0x1d/0x1c0
[  820.312447][T12253]  __x64_sys_rmdir+0x3d/0x40
[  820.312456][T12253]  do_syscall_64+0xf7/0x1c0
[  820.312469][T12253]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  820.312477][T12253] RIP: 0033:0x459f49
[  820.312488][T12253] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  820.312493][T12253] RSP: 002b:00007f6b39de4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000054
[  820.312502][T12253] RAX: ffffffffffffffda RBX: 00007f6b39de4c90 RCX: 0000000000459f49
[  820.312509][T12253] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000200
[  820.312513][T12253] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  820.312518][T12253] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6b39de56d4
[  820.312523][T12253] R13: 00000000004c7966 R14: 00000000004dd870 R15: 0000000000000003
[  820.326478][T12244] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  820.332149][T12245] CPU: 0 PID: 12245 Comm: syz-executor.2 Not tainted 5.4.0-rc5+ #0
[  820.445462][T12245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  820.455501][T12245] Call Trace:
[  820.458778][T12245]  dump_stack+0x1d8/0x2f8
[  820.463090][T12245]  should_fail+0x555/0x770
[  820.467502][T12245]  should_fail_alloc_page+0x55/0x60
[  820.472676][T12245]  prepare_alloc_pages+0x283/0x460
[  820.477764][T12245]  __alloc_pages_nodemask+0xb2/0x5d0
[  820.483026][T12245]  ? check_preemption_disabled+0xa9/0x2a0
[  820.488727][T12245]  alloc_pages_current+0x2db/0x500
[  820.493823][T12245]  skb_page_frag_refill+0x225/0x3f0
[  820.499001][T12245]  sk_page_frag_refill+0x4d/0x220
[  820.504092][T12245]  sk_msg_alloc+0x152/0xa60
[  820.508623][T12245]  ? tcp_stream_memory_free+0xe2/0x160
[  820.514065][T12245]  tls_sw_sendpage+0x68e/0x10d0
[  820.518901][T12245]  ? retint_kernel+0x2b/0x2b
[  820.523475][T12245]  ? bpf_exec_tx_verdict+0x1010/0x1010
[  820.528930][T12245]  inet_sendpage+0x16d/0x340
[  820.533509][T12245]  ? inet_sendmsg+0x310/0x310
[  820.538163][T12245]  sock_sendpage+0xd3/0x120
[  820.542645][T12245]  pipe_to_sendpage+0x1f9/0x2a0
[  820.547474][T12245]  ? sock_fasync+0x100/0x100
[  820.552046][T12245]  __splice_from_pipe+0x2f7/0x8a0
[  820.557051][T12245]  ? generic_splice_sendpage+0x180/0x180
[  820.562670][T12245]  generic_splice_sendpage+0x114/0x180
[  820.568109][T12245]  ? iter_file_splice_write+0xe20/0xe20
[  820.573647][T12245]  __se_sys_splice+0x71a/0x1ac0
[  820.578480][T12245]  ? check_preemption_disabled+0xb7/0x2a0
[  820.584198][T12245]  ? debug_smp_processor_id+0x1c/0x20
[  820.589554][T12245]  ? fpregs_assert_state_consistent+0xb7/0xe0
[  820.595606][T12245]  __x64_sys_splice+0xe5/0x100
[  820.600363][T12245]  do_syscall_64+0xf7/0x1c0
[  820.604864][T12245]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  820.610731][T12245] RIP: 0033:0x459f49
[  820.614615][T12245] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  820.634213][T12245] RSP: 002b:00007fd7bc303c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113
[  820.642610][T12245] RAX: ffffffffffffffda RBX: 00007fd7bc303c90 RCX: 0000000000459f49
[  820.650569][T12245] RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003
[  820.658517][T12245] RBP: 000000000075bf20 R08: 0000000100000000 R09: 0000000000000000
[  820.666468][T12245] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd7bc3046d4
[  820.674417][T12245] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000006
[  820.686079][T12244] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  820.695224][T12244] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
03:43:57 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100066c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

03:43:57 executing program 5 (fault-call:2 fault-nth:1):
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}, {}]}, 0x44, 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

[  820.720747][T12249] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  820.749357][T12249] EXT4-fs (loop0): #clusters per group too big: 16384
03:43:57 executing program 1:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(0x0, 0x0)
r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xc0, 0x0)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}})

03:43:57 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601000074000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

03:43:58 executing program 2 (fault-call:10 fault-nth:3):
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4)
ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001)
connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

[  821.024933][T12278] FAULT_INJECTION: forcing a failure.
[  821.024933][T12278] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  821.038170][T12278] CPU: 1 PID: 12278 Comm: syz-executor.5 Not tainted 5.4.0-rc5+ #0
[  821.046061][T12278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  821.049591][T12274] FAULT_INJECTION: forcing a failure.
[  821.049591][T12274] name failslab, interval 1, probability 0, space 0, times 0
[  821.056114][T12278] Call Trace:
[  821.056138][T12278]  dump_stack+0x1d8/0x2f8
[  821.056154][T12278]  should_fail+0x555/0x770
[  821.056173][T12278]  should_fail_alloc_page+0x55/0x60
[  821.056182][T12278]  prepare_alloc_pages+0x283/0x460
[  821.056201][T12278]  __alloc_pages_nodemask+0xb2/0x5d0
[  821.096302][T12278]  kmem_getpages+0x4d/0xa00
[  821.100799][T12278]  cache_grow_begin+0x7e/0x2c0
[  821.105560][T12278]  cache_alloc_refill+0x311/0x3f0
[  821.110579][T12278]  ? check_preemption_disabled+0xb7/0x2a0
[  821.116293][T12278]  kmem_cache_alloc+0x2b9/0x2e0
[  821.121133][T12278]  ? getname_flags+0xba/0x640
[  821.125798][T12278]  getname_flags+0xba/0x640
[  821.130296][T12278]  do_rmdir+0x3f/0x590
[  821.134357][T12278]  ? trace_irq_disable_rcuidle+0x23/0x1e0
[  821.140067][T12278]  ? trace_hardirqs_on_thunk+0x1a/0x20
[  821.145512][T12278]  ? trace_irq_disable_rcuidle+0x23/0x1e0
[  821.151220][T12278]  ? do_syscall_64+0x1d/0x1c0
[  821.155887][T12278]  __x64_sys_rmdir+0x3d/0x40
[  821.160469][T12278]  do_syscall_64+0xf7/0x1c0
[  821.164966][T12278]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  821.170847][T12278] RIP: 0033:0x459f49
[  821.174727][T12278] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  821.194320][T12278] RSP: 002b:00007f6b39de4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000054
[  821.202717][T12278] RAX: ffffffffffffffda RBX: 00007f6b39de4c90 RCX: 0000000000459f49
[  821.210678][T12278] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000200
[  821.218646][T12278] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  821.226611][T12278] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6b39de56d4
[  821.234575][T12278] R13: 00000000004c7966 R14: 00000000004dd870 R15: 0000000000000003
[  821.242587][T12274] CPU: 0 PID: 12274 Comm: syz-executor.2 Not tainted 5.4.0-rc5+ #0
[  821.250491][T12274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  821.260554][T12274] Call Trace:
[  821.263860][T12274]  dump_stack+0x1d8/0x2f8
[  821.268212][T12274]  should_fail+0x555/0x770
03:43:58 executing program 1:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$midi(0x0, 0xc0, 0x0)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}})

[  821.272651][T12274]  __should_failslab+0x11a/0x160
[  821.277691][T12274]  ? kzalloc+0x26/0x40
[  821.281769][T12274]  should_failslab+0x9/0x20
[  821.286282][T12274]  __kmalloc+0x7a/0x340
[  821.290458][T12274]  kzalloc+0x26/0x40
[  821.294366][T12274]  skcipher_walk_next+0x7a7/0x1540
[  821.299499][T12274]  skcipher_walk_done+0x721/0xe30
[  821.304652][T12274]  ? aesni_decrypt+0x70/0x70
[  821.309251][T12274]  ctr_crypt+0x180/0x300
[  821.313507][T12274]  ? retint_kernel+0x2b/0x2b
[  821.313525][T12274]  crypto_skcipher_encrypt+0x88/0xc0
[  821.313540][T12274]  simd_skcipher_encrypt+0x11f/0x130
[  821.313552][T12274]  crypto_skcipher_encrypt+0x88/0xc0
[  821.313624][T12274]  crypto_ccm_encrypt+0x2f7/0x410
[  821.313639][T12274]  crypto_aead_encrypt+0xa4/0xe0
[  821.323489][T12274]  tls_push_record+0x15b4/0x33c0
[  821.323524][T12274]  bpf_exec_tx_verdict+0xc90/0x1010
[  821.323536][T12274]  ? trace_hardirqs_on+0x74/0x80
[  821.323551][T12274]  ? __kasan_check_read+0x11/0x20
[  821.323617][T12274]  tls_sw_sendpage+0xb00/0x10d0
[  821.341848][T12282] 9pnet: Insufficient options for proto=fd
03:43:58 executing program 3:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60110206c000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  821.344084][T12274]  ? bpf_exec_tx_verdict+0x1010/0x1010
[  821.344099][T12274]  inet_sendpage+0x16d/0x340
[  821.344114][T12274]  ? retint_kernel+0x2b/0x2b
[  821.344125][T12274]  ? inet_sendmsg+0x310/0x310
[  821.344138][T12274]  sock_sendpage+0xd3/0x120
[  821.344154][T12274]  pipe_to_sendpage+0x1f9/0x2a0
[  821.344164][T12274]  ? sock_fasync+0x100/0x100
[  821.344177][T12274]  __splice_from_pipe+0x2f7/0x8a0
[  821.344191][T12274]  ? generic_splice_sendpage+0x180/0x180
[  821.354321][T12274]  generic_splice_sendpage+0x114/0x180
[  821.354338][T12274]  ? iter_file_splice_write+0xe20/0xe20
[  821.354350][T12274]  __se_sys_splice+0x71a/0x1ac0
[  821.354361][T12274]  ? rcu_read_lock_sched_held+0x10b/0x170
[  821.354374][T12274]  ? __kasan_check_write+0x14/0x20
[  821.354385][T12274]  ? __fpregs_load_activate+0x195/0x220
[  821.354398][T12274]  ? switch_fpu_return+0xe/0x10
[  821.354416][T12274]  __x64_sys_splice+0xe5/0x100
[  821.354436][T12274]  do_syscall_64+0xf7/0x1c0
[  821.364376][T12274]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  821.364386][T12274] RIP: 0033:0x459f49
03:43:58 executing program 1:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$midi(0x0, 0xc0, 0x0)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}})

[  821.364398][T12274] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  821.364403][T12274] RSP: 002b:00007fd7bc303c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113
[  821.364413][T12274] RAX: ffffffffffffffda RBX: 00007fd7bc303c90 RCX: 0000000000459f49
[  821.364418][T12274] RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003
[  821.364424][T12274] RBP: 000000000075bf20 R08: 0000000100000000 R09: 0000000000000000
[  821.364430][T12274] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd7bc3046d4
[  821.364436][T12274] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000006
[  821.405832][T12276] EXT4-fs (loop4): filesystem too large to mount safely on this system
[  821.462753][T12277] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended
[  821.548624][T12289] 9pnet: Insufficient options for proto=fd
[  821.564612][T12277] EXT4-fs (loop0): #clusters per group too big: 16384
[  821.579955][T12274] ------------[ cut here ]------------
[  821.585444][T12274] kernel BUG at ./include/linux/scatterlist.h:97!
[  821.617351][T12274] invalid opcode: 0000 [#1] PREEMPT SMP KASAN
[  821.621500][T12287] kobject: 'loop3' (0000000072936861): kobject_uevent_env
[  821.623454][T12274] CPU: 1 PID: 12274 Comm: syz-executor.2 Not tainted 5.4.0-rc5+ #0
[  821.623459][T12274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  821.623479][T12274] RIP: 0010:tls_sw_sendpage+0x10a3/0x10d0
[  821.637814][T12287] kobject: 'loop3' (0000000072936861): fill_kobj_path: path = '/devices/virtual/block/loop3'
[  821.638451][T12274] Code: f1 80 e1 07 fe c1 38 c1 0f 8c 3e fe ff ff 4c 89 f7 e8 61 9e 3d fb e9 31 fe ff ff e8 07 5f 04 fb e9 c0 fe ff ff e8 fd 5e 04 fb <0f> 0b e8 f6 5e 04 fb 0f 0b e8 ef 5e 04 fb 4c 89 f7 48 c7 c6 47 e3
[  821.638456][T12274] RSP: 0018:ffff8880573ff9b0 EFLAGS: 00010246
[  821.651851][ T3900] kobject: 'loop3' (0000000072936861): fill_kobj_path: path = '/devices/virtual/block/loop3'
[  821.654202][T12274] RAX: ffffffff866ee473 RBX: 0000000000000001 RCX: 0000000000040000
[  821.654207][T12274] RDX: ffffc9000816e000 RSI: 000000000003ffff RDI: 0000000000040000
[  821.654213][T12274] RBP: ffff8880573ffaf8 R08: ffffffff866edbd3 R09: fffff940004bcc97
03:43:58 executing program 1:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$midi(0x0, 0xc0, 0x0)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}})

03:43:58 executing program 5 (fault-call:2 fault-nth:2):
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}, {}]}, 0x44, 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

03:43:58 executing program 4:
write(0xffffffffffffffff, &(0x7f0000000180)="d5a50c34c09d8f34ce683f6fba0d31597ebe27f2", 0x14)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60104066c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0)

[  821.654218][T12274] R10: fffff940004bcc97 R11: 0000000000000000 R12: 0000000000000080
[  821.654223][T12274] R13: 1ffff1100a680819 R14: ffff8880534040c8 R15: 0000000000001000
[  821.654231][T12274] FS:  00007fd7bc304700(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000
[  821.654235][T12274] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  821.654245][T12274] CR2: 00000000018d2e80 CR3: 0000000097ea4000 CR4: 00000000001406e0
[  821.665686][ T3900] kobject: 'loop1' (00000000b321d16d): kobject_uevent_env
[  821.683956][T12274] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  821.683961][T12274] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  821.683965][T12274] Call Trace:
[  821.683995][T12274]  ? bpf_exec_tx_verdict+0x1010/0x1010
[  821.684005][T12274]  inet_sendpage+0x16d/0x340
[  821.684014][T12274]  ? inet_sendmsg+0x310/0x310
[  821.684023][T12274]  sock_sendpage+0xd3/0x120
[  821.684036][T12274]  pipe_to_sendpage+0x1f9/0x2a0
[  821.684043][T12274]  ? sock_fasync+0x100/0x100
[  821.684053][T12274]  __splice_from_pipe+0x2f7/0x8a0
[  821.684061][T12274]  ? generic_splice_sendpage+0x180/0x180
[  821.684075][T12274]  generic_splice_sendpage+0x114/0x180
[  821.692775][ T3900] kobject: 'loop1' (00000000b321d16d): fill_kobj_path: path = '/devices/virtual/block/loop1'
[  821.701128][T12274]  ? iter_file_splice_write+0xe20/0xe20
[  821.701138][T12274]  __se_sys_splice+0x71a/0x1ac0
[  821.701146][T12274]  ? rcu_read_lock_sched_held+0x10b/0x170
[  821.701156][T12274]  ? __kasan_check_write+0x14/0x20
[  821.701165][T12274]  ? __fpregs_load_activate+0x195/0x220
[  821.701175][T12274]  ? switch_fpu_return+0xe/0x10
[  821.701187][T12274]  __x64_sys_splice+0xe5/0x100
[  821.701199][T12274]  do_syscall_64+0xf7/0x1c0
[  821.701209][T12274]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  821.701217][T12274] RIP: 0033:0x459f49
[  821.701229][T12274] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  821.915656][T12274] RSP: 002b:00007fd7bc303c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113
[  821.924063][T12274] RAX: ffffffffffffffda RBX: 00007fd7bc303c90 RCX: 0000000000459f49
[  821.932014][T12274] RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003
[  821.939963][T12274] RBP: 000000000075bf20 R08: 0000000100000000 R09: 0000000000000000
[  821.947911][T12274] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd7bc3046d4
[  821.955856][T12274] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000006
[  821.963811][T12274] Modules linked in:
[  821.983866][T12287] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[  821.984113][ T3900] kobject: 'loop5' (00000000fe4b6dc6): kobject_uevent_env
[  821.995872][T12287] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem
[  822.010822][T12274] ---[ end trace 404375ad6ab62d57 ]---
[  822.025821][T12287] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024)
[  822.042986][ T3900] kobject: 'loop5' (00000000fe4b6dc6): fill_kobj_path: path = '/devices/virtual/block/loop5'
[  822.045012][T12299] FAULT_INJECTION: forcing a failure.
[  822.045012][T12299] name failslab, interval 1, probability 0, space 0, times 0
[  822.065582][ T3900] kobject: 'loop1' (00000000b321d16d): kobject_uevent_env
[  822.069668][T12274] RIP: 0010:tls_sw_sendpage+0x10a3/0x10d0
[  822.080448][T12298] 9pnet: Insufficient options for proto=fd
03:43:59 executing program 0:
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e601000075000000000000000000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xba71, 0x400}], 0x5, 0x0)

[  822.082339][T12274] Code: f1 80 e1 07 fe c1 38 c1 0f 8c 3e fe ff ff 4c 89 f7 e8 61 9e 3d fb e9 31 fe ff ff e8 07 5f 04 fb e9 c0 fe ff ff e8 fd 5e 04 fb <0f> 0b e8 f6 5e 04 fb 0f 0b e8 ef 5e 04 fb 4c 89 f7 48 c7 c6 47 e3
[  822.099372][ T3900] kobject: 'loop1' (00000000b321d16d): fill_kobj_path: path = '/devices/virtual/block/loop1'
[  822.107294][T12299] CPU: 1 PID: 12299 Comm: syz-executor.5 Tainted: G      D           5.4.0-rc5+ #0
[  822.125953][T12299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  822.135992][T12299] Call Trace:
[  822.139271][T12299]  dump_stack+0x1d8/0x2f8
[  822.143594][T12299]  should_fail+0x555/0x770
[  822.148075][T12299]  __should_failslab+0x11a/0x160
[  822.153000][T12299]  ? tomoyo_realpath_from_path+0xdc/0x7c0
[  822.158781][T12299]  should_failslab+0x9/0x20
[  822.163258][T12299]  __kmalloc+0x7a/0x340
[  822.167387][T12299]  ? tomoyo_realpath_from_path+0xca/0x7c0
[  822.173079][T12299]  tomoyo_realpath_from_path+0xdc/0x7c0
[  822.178603][T12299]  tomoyo_path_perm+0x192/0x850
[  822.183437][T12299]  ? trace_lock_release+0x135/0x1a0
[  822.188629][T12299]  ? rcu_lock_release+0x9/0x30
[  822.193390][T12299]  tomoyo_path_rmdir+0x8f/0xb0
[  822.198158][T12299]  security_path_rmdir+0xe9/0x160
[  822.203163][T12299]  do_rmdir+0x221/0x590
[  822.207299][T12299]  __x64_sys_rmdir+0x3d/0x40
[  822.211868][T12299]  do_syscall_64+0xf7/0x1c0
[  822.216346][T12299]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  822.222227][T12299] RIP: 0033:0x459f49
[  822.226096][T12299] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  822.245683][T12299] RSP: 002b:00007f6b39de4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000054
[  822.254068][T12299] RAX: ffffffffffffffda RBX: 00007f6b39de4c90 RCX: 0000000000459f49
[  822.262014][T12299] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000200
[  822.269972][T12299] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  822.278179][T12299] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6b39de56d4
[  822.286125][T12299] R13: 00000000004c7966 R14: 00000000004dd870 R15: 0000000000000003
03:43:59 executing program 1:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x0)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}})

[  822.297583][T12287] kobject: 'loop3' (0000000072936861): kobject_uevent_env
[  822.304890][T12287] kobject: 'loop3' (0000000072936861): fill_kobj_path: path = '/devices/virtual/block/loop3'
[  822.315310][T12274] RSP: 0018:ffff8880573ff9b0 EFLAGS: 00010246
[  822.324289][T12274] RAX: ffffffff866ee473 RBX: 0000000000000001 RCX: 0000000000040000
[  822.333399][T12274] RDX: ffffc9000816e000 RSI: 000000000003ffff RDI: 0000000000040000
[  822.333458][T12300] kobject: 'loop4' (000000000a56c87e): kobject_uevent_env
[  822.343787][T12274] RBP: ffff8880573ffaf8 R08: ffffffff866edbd3 R09: fffff940004bcc97
[  822.349532][T12300] kobject: 'loop4' (000000000a56c87e): fill_kobj_path: path = '/devices/virtual/block/loop4'
[  822.356809][T12274] R10: fffff940004bcc97 R11: 0000000000000000 R12: 0000000000000080
[  822.368315][ T3900] kobject: 'loop4' (000000000a56c87e): kobject_uevent_env
[  822.377269][T12274] R13: 1ffff1100a680819 R14: ffff8880534040c8 R15: 0000000000001000
[  822.383343][ T3900] kobject: 'loop4' (000000000a56c87e): fill_kobj_path: path = '/devices/virtual/block/loop4'
[  822.390360][T12299] ERROR: Out of memory at tomoyo_realpath_from_path.
[  822.402013][T12274] FS:  00007fd7bc304700(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000
[  822.418920][T12274] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  822.425737][T12274] CR2: 00007f6647e566f0 CR3: 0000000097ea4000 CR4: 00000000001406e0
[  822.433973][T12274] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
03:43:59 executing program 5 (fault-call:2 fault-nth:3):
mkdir(&(0x7f00000009c0)='./file1\x00', 0x0)
setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {}, {}]}, 0x44, 0x0)
rmdir(&(0x7f0000000200)='./file1\x00')

[  822.442311][T12274] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  822.450554][T12284] kobject: 'loop0' (0000000074d894e5): kobject_uevent_env
[  822.457976][T12284] kobject: 'loop0' (0000000074d894e5): fill_kobj_path: path = '/devices/virtual/block/loop0'
[  822.469027][T12274] Kernel panic - not syncing: Fatal exception
[  822.476524][T12274] Kernel Offset: disabled
[  822.480865][T12274] Rebooting in 86400 seconds..