ize: 3405905920 [ 3026.360943] EXT4-fs (loop3): Invalid log block size: 3171024896 04:07:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000002bd41000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3026.392231] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000002cba22000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000620000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:18 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f00000000c0)={0x800, 0x10002, 0x7, 0x1, 0x6, 0xfffffffffffffffb, 0x2, 0x5}, &(0x7f0000000100)={0x0, 0x400000006, 0x4000, 0x6, 0xfffffffffffffffe, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300)={[0x8000000000000000]}, 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) semget$private(0x0, 0x0, 0x0) (async) unshare(0x0) (async) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) (async) unshare(0x80) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (async) unshare(0x2020000) (async) lseek(r2, 0x1, 0x1) (async) pselect6(0x40, &(0x7f00000000c0)={0x800, 0x10002, 0x7, 0x1, 0x6, 0xfffffffffffffffb, 0x2, 0x5}, &(0x7f0000000100)={0x0, 0x400000006, 0x4000, 0x6, 0xfffffffffffffffe, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300)={[0x8000000000000000]}, 0x8}) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) (async) [ 3026.649759] EXT4-fs (loop3): Invalid log block size: 3171024896 [ 3026.654589] EXT4-fs (loop2): Invalid log cluster size: 3405905920 04:07:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000002cba32000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3026.780182] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3027.003186] EXT4-fs (loop2): Invalid log cluster size: 3405905920 04:07:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) unshare(0x18010100) unshare(0x10000) unshare(0x80) (async) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async, rerun: 64) r1 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) (rerun: 64) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00') preadv(r2, &(0x7f00000017c0), 0x332, 0x0, 0x0) (async, rerun: 32) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r1) (async, rerun: 32) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) 04:07:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000002bd42000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000720000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:18 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4000005, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) semctl$GETALL(r0, 0x0, 0xd, &(0x7f00000000c0)=""/91) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:18 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f00000001c0)={0x50, 0x0, 0x0, {0x7, 0x24, 0xfffffff7, 0x4004, 0x4, 0x769, 0x3, 0x390}}, 0x50) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000003a42000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3027.230220] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000920000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3027.346918] EXT4-fs (loop3): Invalid log block size: 3171024896 04:07:19 executing program 1: unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4000005, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = semget$private(0x0, 0x0, 0x0) (async) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) (async) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) semctl$GETALL(r0, 0x0, 0xd, &(0x7f00000000c0)=""/91) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) (async) lseek(r2, 0x1, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:19 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f00000001c0)={0x50, 0x0, 0x0, {0x7, 0x24, 0xfffffff7, 0x4004, 0x4, 0x769, 0x3, 0x390}}, 0x50) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) semget$private(0x0, 0x0, 0x0) (async) unshare(0x0) (async) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) (async) write$FUSE_INIT(0xffffffffffffffff, &(0x7f00000001c0)={0x50, 0x0, 0x0, {0x7, 0x24, 0xfffffff7, 0x4004, 0x4, 0x769, 0x3, 0x390}}, 0x50) (async) unshare(0x80) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (async) unshare(0x2020000) (async) lseek(r2, 0x1, 0x1) (async) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) (async) [ 3027.407624] EXT4-fs (loop2): Invalid log cluster size: 50331648 04:07:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000002cba42000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000002bd43000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3027.586099] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000021020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3027.840807] EXT4-fs (loop3): Invalid log block size: 3171024896 [ 3027.847119] EXT4-fs (loop2): Invalid log cluster size: 3405905920 [ 3027.934379] EXT4-fs (loop4): #blocks per group too big: 33562624 04:07:19 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x10000) unshare(0x2c000080) unshare(0x80) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) futex(&(0x7f00000000c0)=0x1, 0x0, 0xffffffff, &(0x7f0000000100), &(0x7f00000001c0)=0x1, 0x3) unshare(0x0) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) creat(&(0x7f0000000000)='./file0\x00', 0x20) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) 04:07:19 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4000005, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) semctl$GETALL(r0, 0x0, 0xd, &(0x7f00000000c0)=""/91) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4000005, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) semget$private(0x0, 0x0, 0x0) (async) unshare(0x0) (async) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) (async) unshare(0x80) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) semctl$GETALL(r0, 0x0, 0xd, &(0x7f00000000c0)=""/91) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (async) unshare(0x2020000) (async) lseek(r2, 0x1, 0x1) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) (async) 04:07:19 executing program 5: unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) (async) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f00000001c0)={0x50, 0x0, 0x0, {0x7, 0x24, 0xfffffff7, 0x4004, 0x4, 0x769, 0x3, 0x390}}, 0x50) (async) unshare(0x80) (async) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) (async) lseek(r2, 0x1, 0x1) (async) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000002bd44000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000002cba52000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000041020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3028.106029] EXT4-fs (loop3): Invalid log block size: 3171024896 04:07:19 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x40000) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:19 executing program 5: unshare(0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r3 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xb) unshare(0x2020000) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x9, 0xae, 0x98, 0x8, 0x0, 0x1ff, 0x20002, 0xb, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f00000000c0), 0x1}, 0x14882, 0x20, 0x1, 0x9, 0xbae7, 0x6, 0x9, 0x0, 0x5}, 0x0, 0x0, r0, 0x3) lseek(r3, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3028.278764] EXT4-fs (loop2): Invalid log cluster size: 3405905920 04:07:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000002bd45000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000002cba62000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3028.390546] EXT4-fs (loop4): #blocks per group too big: 67117056 04:07:20 executing program 1: unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) (async) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x40000) (async) unshare(0x10000) unshare(0x80) (async) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) (async, rerun: 32) unshare(0x0) (async, rerun: 32) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (async) unshare(0x2020000) (async) lseek(r2, 0x1, 0x1) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3028.531882] EXT4-fs (loop3): Invalid log block size: 3171024896 04:07:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000001420000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3028.762877] EXT4-fs (loop2): Invalid log cluster size: 3405905920 [ 3028.899773] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:20 executing program 5: unshare(0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r3 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xb) unshare(0x2020000) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x9, 0xae, 0x98, 0x8, 0x0, 0x1ff, 0x20002, 0xb, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f00000000c0), 0x1}, 0x14882, 0x20, 0x1, 0x9, 0xbae7, 0x6, 0x9, 0x0, 0x5}, 0x0, 0x0, r0, 0x3) lseek(r3, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) semget$private(0x0, 0x0, 0x0) (async) unshare(0x0) (async) semop(r1, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) (async) unshare(0x80) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) (async) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xb) (async) unshare(0x2020000) (async) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x9, 0xae, 0x98, 0x8, 0x0, 0x1ff, 0x20002, 0xb, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f00000000c0), 0x1}, 0x14882, 0x20, 0x1, 0x9, 0xbae7, 0x6, 0x9, 0x0, 0x5}, 0x0, 0x0, r0, 0x3) (async) lseek(r3, 0x1, 0x1) (async) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) (async) 04:07:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) unshare(0x18010100) unshare(0x10000) unshare(0x2c000080) (async) unshare(0x80) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) futex(&(0x7f00000000c0)=0x1, 0x0, 0xffffffff, &(0x7f0000000100), &(0x7f00000001c0)=0x1, 0x3) unshare(0x0) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) creat(&(0x7f0000000000)='./file0\x00', 0x20) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) 04:07:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000002bd46000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000002cba72000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000002020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:20 executing program 1: unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) (async) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x40000) (async) unshare(0x10000) (async) unshare(0x80) (async) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (async) unshare(0x2020000) lseek(r2, 0x1, 0x1) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:20 executing program 5: unshare(0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r3 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xb) unshare(0x2020000) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x9, 0xae, 0x98, 0x8, 0x0, 0x1ff, 0x20002, 0xb, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f00000000c0), 0x1}, 0x14882, 0x20, 0x1, 0x9, 0xbae7, 0x6, 0x9, 0x0, 0x5}, 0x0, 0x0, r0, 0x3) lseek(r3, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) semget$private(0x0, 0x0, 0x0) (async) unshare(0x0) (async) semop(r1, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) (async) unshare(0x80) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) (async) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xb) (async) unshare(0x2020000) (async) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x9, 0xae, 0x98, 0x8, 0x0, 0x1ff, 0x20002, 0xb, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f00000000c0), 0x1}, 0x14882, 0x20, 0x1, 0x9, 0xbae7, 0x6, 0x9, 0x0, 0x5}, 0x0, 0x0, r0, 0x3) (async) lseek(r3, 0x1, 0x1) (async) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) (async) 04:07:20 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x1, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3029.315466] EXT4-fs (loop2): Invalid log cluster size: 3405905920 [ 3029.322159] EXT4-fs (loop3): Invalid log block size: 3171024896 04:07:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000002bd47000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3029.375073] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000002320000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000002cba82000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:21 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x1, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) semget$private(0x0, 0x0, 0x0) (async) unshare(0x0) (async) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) (async) unshare(0x80) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x1, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (async) unshare(0x2020000) (async) lseek(r2, 0x1, 0x1) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) (async) 04:07:21 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x7fffffffffffffff, 0x91}, 0x8130, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x8, 0xffffffffffffffff, 0x2ffffffffd, 0x2, 0x9, 0x3, 0x4e9, 0x7}, &(0x7f00000001c0)={0x7fffffff, 0x47a, 0x1, 0x7, 0x1, 0x2, 0x3, 0x80000002}, &(0x7f0000000200)={0x7f90, 0x9, 0x0, 0x8000000000, 0x89, 0x3, 0x2, 0x3a5}, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f00000002c0)={&(0x7f0000000280)={[0xffc0000000000000]}, 0x8}) [ 3029.779407] EXT4-fs (loop3): Invalid log block size: 3171024896 04:07:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x10000) unshare(0x2c000080) unshare(0x80) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) futex(&(0x7f00000000c0)=0x1, 0x0, 0xffffffff, &(0x7f0000000100), &(0x7f00000001c0)=0x1, 0x3) unshare(0x0) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) creat(&(0x7f0000000000)='./file0\x00', 0x20) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) unshare(0x18010100) (async) unshare(0x10000) (async) unshare(0x2c000080) (async) unshare(0x80) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) futex(&(0x7f00000000c0)=0x1, 0x0, 0xffffffff, &(0x7f0000000100), &(0x7f00000001c0)=0x1, 0x3) (async) unshare(0x0) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) creat(&(0x7f0000000000)='./file0\x00', 0x20) (async) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) (async) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) 04:07:21 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) (async) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) (async) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x1, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (async) unshare(0x2020000) (async) lseek(r2, 0x1, 0x1) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000002cba92000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000002bd48000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:21 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x7fffffffffffffff, 0x91}, 0x8130, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x8, 0xffffffffffffffff, 0x2ffffffffd, 0x2, 0x9, 0x3, 0x4e9, 0x7}, &(0x7f00000001c0)={0x7fffffff, 0x47a, 0x1, 0x7, 0x1, 0x2, 0x3, 0x80000002}, &(0x7f0000000200)={0x7f90, 0x9, 0x0, 0x8000000000, 0x89, 0x3, 0x2, 0x3a5}, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f00000002c0)={&(0x7f0000000280)={[0xffc0000000000000]}, 0x8}) unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x7fffffffffffffff, 0x91}, 0x8130, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) semget$private(0x0, 0x0, 0x0) (async) semctl$IPC_RMID(0x0, 0x0, 0x0) (async) unshare(0x0) (async) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) (async) unshare(0x80) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (async) unshare(0x2020000) (async) lseek(r2, 0x1, 0x1) (async) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) (async) pselect6(0x40, &(0x7f00000000c0)={0x8, 0xffffffffffffffff, 0x2ffffffffd, 0x2, 0x9, 0x3, 0x4e9, 0x7}, &(0x7f00000001c0)={0x7fffffff, 0x47a, 0x1, 0x7, 0x1, 0x2, 0x3, 0x80000002}, &(0x7f0000000200)={0x7f90, 0x9, 0x0, 0x8000000000, 0x89, 0x3, 0x2, 0x3a5}, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f00000002c0)={&(0x7f0000000280)={[0xffc0000000000000]}, 0x8}) (async) [ 3029.980214] EXT4-fs (loop2): Invalid log cluster size: 3405905920 [ 3030.019832] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000002d20000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:21 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, &(0x7f0000000100)=[{0x2, 0x8001, 0x800}, {0x3, 0x1, 0x1000}], 0x2) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) semop(r0, &(0x7f00000000c0)=[{0x1, 0x7, 0x1800}], 0x1) 04:07:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x798, 0x1, @perf_config_ext={0x0, 0x91}, 0x800, 0x2, 0x1000, 0x0, 0x0, 0x0, 0xfffc, 0x0, 0xfffffffd, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x10000) unshare(0x80) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x40100, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) [ 3030.258050] EXT4-fs (loop2): Invalid log cluster size: 3405905920 [ 3030.279489] EXT4-fs (loop3): Invalid log block size: 3171024896 04:07:21 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x7fffffffffffffff, 0x91}, 0x8130, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = semget$private(0x0, 0x0, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) unshare(0x0) (async) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) (async) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) (async) pselect6(0x40, &(0x7f00000000c0)={0x8, 0xffffffffffffffff, 0x2ffffffffd, 0x2, 0x9, 0x3, 0x4e9, 0x7}, &(0x7f00000001c0)={0x7fffffff, 0x47a, 0x1, 0x7, 0x1, 0x2, 0x3, 0x80000002}, &(0x7f0000000200)={0x7f90, 0x9, 0x0, 0x8000000000, 0x89, 0x3, 0x2, 0x3a5}, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f00000002c0)={&(0x7f0000000280)={[0xffc0000000000000]}, 0x8}) [ 3030.332470] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:22 executing program 1: unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) (async) unshare(0x0) semop(r0, &(0x7f0000000100)=[{0x2, 0x8001, 0x800}, {0x3, 0x1, 0x1000}], 0x2) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) (async) unshare(0x80) (async) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) (async) semop(r0, &(0x7f00000000c0)=[{0x1, 0x7, 0x1800}], 0x1) 04:07:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000003d02000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000002bd49000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:22 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, &(0x7f0000000100)=[{0x2, 0x8001, 0x800}, {0x3, 0x1, 0x1000}], 0x2) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) semop(r0, &(0x7f00000000c0)=[{0x1, 0x7, 0x1800}], 0x1) unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) semget$private(0x0, 0x0, 0x0) (async) unshare(0x0) (async) semop(r0, &(0x7f0000000100)=[{0x2, 0x8001, 0x800}, {0x3, 0x1, 0x1000}], 0x2) (async) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) (async) unshare(0x80) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (async) unshare(0x2020000) (async) lseek(r2, 0x1, 0x1) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) (async) semop(r0, &(0x7f00000000c0)=[{0x1, 0x7, 0x1800}], 0x1) (async) 04:07:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000013c20000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:22 executing program 5: unshare(0x0) unshare(0x4010000) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0xc000200) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:22 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x20200) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0xa9, 0x40, 0xb0, 0x4, 0x40, 0xffffffffffffffff, 0x400, 0x4}, &(0x7f0000000100)={0x7, 0xfffffffffffffffd, 0x8000, 0x1, 0xe31, 0x7318, 0x7, 0x2}, &(0x7f00000001c0)={0x8001, 0x2e93, 0x5, 0x9, 0x4, 0x7, 0x2, 0xfffffffffffffffb}, &(0x7f00000002c0)={r3, r4+10000000}, &(0x7f0000000340)={&(0x7f0000000300)={[0x6]}, 0x8}) unshare(0x2020000) lseek(r2, 0x1, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000ffffffe22000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3030.729703] EXT4-fs (loop2): Invalid log cluster size: 50331648 [ 3030.744242] EXT4-fs (loop4): #blocks per group too big: 16785408 [ 3030.750389] EXT4-fs (loop3): Invalid log block size: 3171024896 04:07:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000003f20000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000002bd4a000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3031.001708] EXT4-fs (loop2): Invalid log cluster size: 4294967040 [ 3031.059714] EXT4-fs (loop3): Invalid log block size: 3171024896 [ 3031.093562] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x798, 0x1, @perf_config_ext={0x0, 0x91}, 0x800, 0x2, 0x1000, 0x0, 0x0, 0x0, 0xfffc, 0x0, 0xfffffffd, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) unshare(0x18010100) unshare(0x10000) (async, rerun: 32) unshare(0x80) (rerun: 32) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x40100, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async, rerun: 64) unshare(0x0) (rerun: 64) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) 04:07:22 executing program 5: unshare(0x0) (async) unshare(0x4010000) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = semget$private(0x0, 0x0, 0x0) (async) unshare(0xc000200) (async) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) unshare(0x80) (async) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (async) unshare(0x2020000) (async) lseek(r2, 0x1, 0x1) (async) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:22 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x20200) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0xa9, 0x40, 0xb0, 0x4, 0x40, 0xffffffffffffffff, 0x400, 0x4}, &(0x7f0000000100)={0x7, 0xfffffffffffffffd, 0x8000, 0x1, 0xe31, 0x7318, 0x7, 0x2}, &(0x7f00000001c0)={0x8001, 0x2e93, 0x5, 0x9, 0x4, 0x7, 0x2, 0xfffffffffffffffb}, &(0x7f00000002c0)={r3, r4+10000000}, &(0x7f0000000340)={&(0x7f0000000300)={[0x6]}, 0x8}) unshare(0x2020000) lseek(r2, 0x1, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) semget$private(0x0, 0x0, 0x0) (async) unshare(0x0) (async) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) (async) unshare(0x80) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (async) unshare(0x20200) (async) clock_gettime(0x0, &(0x7f0000000200)) (async) pselect6(0x40, &(0x7f00000000c0)={0xa9, 0x40, 0xb0, 0x4, 0x40, 0xffffffffffffffff, 0x400, 0x4}, &(0x7f0000000100)={0x7, 0xfffffffffffffffd, 0x8000, 0x1, 0xe31, 0x7318, 0x7, 0x2}, &(0x7f00000001c0)={0x8001, 0x2e93, 0x5, 0x9, 0x4, 0x7, 0x2, 0xfffffffffffffffb}, &(0x7f00000002c0)={r3, r4+10000000}, &(0x7f0000000340)={&(0x7f0000000300)={[0x6]}, 0x8}) (async) unshare(0x2020000) (async) lseek(r2, 0x1, 0x1) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) (async) 04:07:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000001e42000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000002bd4b000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000004020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:22 executing program 5: unshare(0x0) (async) unshare(0x4010000) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) r0 = semget$private(0x0, 0x0, 0x0) (async, rerun: 64) unshare(0xc000200) unshare(0x0) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) (async) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async, rerun: 32) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (rerun: 32) unshare(0x2020000) (async) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3031.351840] EXT4-fs (loop3): Invalid log block size: 3171024896 04:07:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000002bd4c000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3031.439247] EXT4-fs (loop2): Invalid log cluster size: 16777216 [ 3031.487170] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000ffffffe42000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000005020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:23 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) (async) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) (async) unshare(0x80) (async) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) (async) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (async) unshare(0x20200) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0xa9, 0x40, 0xb0, 0x4, 0x40, 0xffffffffffffffff, 0x400, 0x4}, &(0x7f0000000100)={0x7, 0xfffffffffffffffd, 0x8000, 0x1, 0xe31, 0x7318, 0x7, 0x2}, &(0x7f00000001c0)={0x8001, 0x2e93, 0x5, 0x9, 0x4, 0x7, 0x2, 0xfffffffffffffffb}, &(0x7f00000002c0)={r3, r4+10000000}, &(0x7f0000000340)={&(0x7f0000000300)={[0x6]}, 0x8}) (async) unshare(0x2020000) (async) lseek(r2, 0x1, 0x1) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3031.686087] EXT4-fs (loop2): Invalid log cluster size: 4294967040 [ 3031.696476] EXT4-fs (loop3): Invalid log block size: 3171024896 04:07:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000003ea2000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3031.842076] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3031.882713] EXT4-fs (loop2): Invalid log cluster size: 50331648 04:07:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x798, 0x1, @perf_config_ext={0x0, 0x91}, 0x800, 0x2, 0x1000, 0x0, 0x0, 0x0, 0xfffc, 0x0, 0xfffffffd, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) unshare(0x18010100) unshare(0x10000) unshare(0x80) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x40100, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) (async) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) 04:07:23 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) pselect6(0x40, &(0x7f00000000c0)={0x4, 0x282, 0x40, 0xfffffffffffffffa, 0x1, 0x23, 0x80, 0x2}, &(0x7f00000001c0)={0x4, 0x4, 0x779, 0x9, 0xfffffffffffffffe, 0x80000000, 0x0, 0x5}, &(0x7f0000000200)={0x1, 0x2, 0x8, 0x2, 0x4, 0x8, 0xa, 0x8001}, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={&(0x7f0000000280)={[0x3]}, 0x8}) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000002bd4d000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:23 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0xaebc, 0x0, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) unshare(0x0) 04:07:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000005620000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000001ec2000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:23 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) pselect6(0x40, &(0x7f00000000c0)={0x4, 0x282, 0x40, 0xfffffffffffffffa, 0x1, 0x23, 0x80, 0x2}, &(0x7f00000001c0)={0x4, 0x4, 0x779, 0x9, 0xfffffffffffffffe, 0x80000000, 0x0, 0x5}, &(0x7f0000000200)={0x1, 0x2, 0x8, 0x2, 0x4, 0x8, 0xa, 0x8001}, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={&(0x7f0000000280)={[0x3]}, 0x8}) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) semget$private(0x0, 0x0, 0x0) (async) unshare(0x0) (async) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) (async) unshare(0x80) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) pselect6(0x40, &(0x7f00000000c0)={0x4, 0x282, 0x40, 0xfffffffffffffffa, 0x1, 0x23, 0x80, 0x2}, &(0x7f00000001c0)={0x4, 0x4, 0x779, 0x9, 0xfffffffffffffffe, 0x80000000, 0x0, 0x5}, &(0x7f0000000200)={0x1, 0x2, 0x8, 0x2, 0x4, 0x8, 0xa, 0x8001}, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={&(0x7f0000000280)={[0x3]}, 0x8}) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (async) unshare(0x2020000) (async) lseek(r2, 0x1, 0x1) (async) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) (async) [ 3032.260403] EXT4-fs (loop2): Invalid log cluster size: 16777216 04:07:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000fffffff02000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000002bd4e000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:23 executing program 1: unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) (async) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) (async) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0xaebc, 0x0, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (async) unshare(0x2020000) (async) lseek(r2, 0x1, 0x1) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) (async) unshare(0x0) [ 3032.324698] EXT4-fs (loop3): Invalid log block size: 3171024896 [ 3032.353712] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:24 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) (async) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) unshare(0x80) (async) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) (async) pselect6(0x40, &(0x7f00000000c0)={0x4, 0x282, 0x40, 0xfffffffffffffffa, 0x1, 0x23, 0x80, 0x2}, &(0x7f00000001c0)={0x4, 0x4, 0x779, 0x9, 0xfffffffffffffffe, 0x80000000, 0x0, 0x5}, &(0x7f0000000200)={0x1, 0x2, 0x8, 0x2, 0x4, 0x8, 0xa, 0x8001}, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={&(0x7f0000000280)={[0x3]}, 0x8}) (async) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) (async) lseek(r2, 0x1, 0x1) (async) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:24 executing program 1: unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) (async) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) (async) unshare(0x80) (async) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0xaebc, 0x0, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) unshare(0x0) [ 3032.722149] EXT4-fs (loop3): Invalid log block size: 3171024896 04:07:24 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x10000) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)=0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)='\b', 0x1) fcntl$setstatus(r2, 0x4, 0x42000) r3 = dup(r2) r4 = open(&(0x7f0000000280)='./file1\x00', 0x10f0c2, 0x0) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d1) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) unshare(0x80) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) 04:07:24 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x9}, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xfffffffffffffffa, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=0x0, @ANYRES64, @ANYRES32=0x0, @ANYBLOB="08000300", @ANYRES32=0x0, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="000000613bf3c9e8bf244c5b4640", @ANYRES32=0x0, @ANYBLOB="1c004a7e97ec7ffe7f0090b9475312b5a6cd3967a2542edeed487cf0d9d621a9f9d9f0423f639c8dac33c16eaa908a1f4895141c568affee089567d165090741c0", @ANYRES32, @ANYBLOB="c849a1b08ecf67d30c4e"], 0x58}, 0x1, 0x0, 0x0, 0x20068041}, 0x8040) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x8, 0x2d, 0xcf, 0xfd, 0x0, 0x1, 0x100c00, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_config_ext={0x9, 0x3}, 0x120, 0xffffffff00000001, 0x6, 0x8, 0x3ff, 0x81, 0x2, 0x0, 0x1ff, 0x0, 0x3}, 0x0, 0x10, 0xffffffffffffffff, 0x2) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) unshare(0x20010000) lseek(r2, 0x1, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000005c20000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000fffffff42000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:24 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000002bd4f000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3033.059881] EXT4-fs (loop3): Invalid log block size: 3171024896 04:07:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000350000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3033.108132] audit: type=1800 audit(1653538044.669:332): pid=13745 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="sda1" ino=14371 res=0 [ 3033.147511] EXT4-fs (loop2): Invalid log cluster size: 4294967040 04:07:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000fffffff52000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:24 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x10000) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)=0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)='\b', 0x1) fcntl$setstatus(r2, 0x4, 0x42000) r3 = dup(r2) r4 = open(&(0x7f0000000280)='./file1\x00', 0x10f0c2, 0x0) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d1) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) unshare(0x80) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) unshare(0x18010100) (async) unshare(0x10000) (async) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) (async) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) (async) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) (async) socket$alg(0x26, 0x5, 0x0) (async) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) (async) accept$alg(r1, 0x0, 0x0) (async) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)='\b', 0x1) (async) fcntl$setstatus(r2, 0x4, 0x42000) (async) dup(r2) (async) open(&(0x7f0000000280)='./file1\x00', 0x10f0c2, 0x0) (async) ftruncate(r4, 0x200004) (async) sendfile(r3, r4, 0x0, 0x80001d00c0d1) (async) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) (async) unshare(0x80) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) [ 3033.187990] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3033.200919] EXT4-fs (loop3): Invalid log block size: 50331648 04:07:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000002bd50000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:24 executing program 5: unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) (async) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x80) (async) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (async) unshare(0x2020000) (async) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000006020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:24 executing program 1: unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x9}, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xfffffffffffffffa, 0xffffffffffffffff, 0x0) (async) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) (async) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) (async) unshare(0x80) (async) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=0x0, @ANYRES64, @ANYRES32=0x0, @ANYBLOB="08000300", @ANYRES32=0x0, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="000000613bf3c9e8bf244c5b4640", @ANYRES32=0x0, @ANYBLOB="1c004a7e97ec7ffe7f0090b9475312b5a6cd3967a2542edeed487cf0d9d621a9f9d9f0423f639c8dac33c16eaa908a1f4895141c568affee089567d165090741c0", @ANYRES32, @ANYBLOB="c849a1b08ecf67d30c4e"], 0x58}, 0x1, 0x0, 0x0, 0x20068041}, 0x8040) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x8, 0x2d, 0xcf, 0xfd, 0x0, 0x1, 0x100c00, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_config_ext={0x9, 0x3}, 0x120, 0xffffffff00000001, 0x6, 0x8, 0x3ff, 0x81, 0x2, 0x0, 0x1ff, 0x0, 0x3}, 0x0, 0x10, 0xffffffffffffffff, 0x2) (async) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) (async) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (async) unshare(0x2020000) (async) unshare(0x20010000) (async) lseek(r2, 0x1, 0x1) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:24 executing program 5: unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) (async) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (async) unshare(0x2020000) lseek(r2, 0x1, 0x1) (async) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3033.313126] audit: type=1800 audit(1653538044.869:333): pid=13771 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="sda1" ino=14065 res=0 04:07:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x10000) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)=0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)='\b', 0x1) fcntl$setstatus(r2, 0x4, 0x42000) r3 = dup(r2) r4 = open(&(0x7f0000000280)='./file1\x00', 0x10f0c2, 0x0) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d1) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) unshare(0x80) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) unshare(0x18010100) (async) unshare(0x10000) (async) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) (async) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) (async) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) (async) socket$alg(0x26, 0x5, 0x0) (async) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) (async) accept$alg(r1, 0x0, 0x0) (async) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)='\b', 0x1) (async) fcntl$setstatus(r2, 0x4, 0x42000) (async) dup(r2) (async) open(&(0x7f0000000280)='./file1\x00', 0x10f0c2, 0x0) (async) ftruncate(r4, 0x200004) (async) sendfile(r3, r4, 0x0, 0x80001d00c0d1) (async) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) (async) unshare(0x80) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) 04:07:25 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) unshare(0x8000000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:25 executing program 1: unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x9}, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xfffffffffffffffa, 0xffffffffffffffff, 0x0) (async) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) (async) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) (async) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async, rerun: 64) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=0x0, @ANYRES64, @ANYRES32=0x0, @ANYBLOB="08000300", @ANYRES32=0x0, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="000000613bf3c9e8bf244c5b4640", @ANYRES32=0x0, @ANYBLOB="1c004a7e97ec7ffe7f0090b9475312b5a6cd3967a2542edeed487cf0d9d621a9f9d9f0423f639c8dac33c16eaa908a1f4895141c568affee089567d165090741c0", @ANYRES32, @ANYBLOB="c849a1b08ecf67d30c4e"], 0x58}, 0x1, 0x0, 0x0, 0x20068041}, 0x8040) (rerun: 64) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x8, 0x2d, 0xcf, 0xfd, 0x0, 0x1, 0x100c00, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_config_ext={0x9, 0x3}, 0x120, 0xffffffff00000001, 0x6, 0x8, 0x3ff, 0x81, 0x2, 0x0, 0x1ff, 0x0, 0x3}, 0x0, 0x10, 0xffffffffffffffff, 0x2) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async, rerun: 64) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) (rerun: 64) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (async) unshare(0x2020000) unshare(0x20010000) (async) lseek(r2, 0x1, 0x1) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3033.447447] EXT4-fs (loop3): Invalid log block size: 3171024896 [ 3033.482804] EXT4-fs (loop2): Invalid log cluster size: 4294967040 04:07:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000002bd51000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3033.492575] audit: type=1800 audit(1653538045.049:334): pid=13827 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="sda1" ino=13890 res=0 04:07:25 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x20000800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3033.678742] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000fffffff62000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x10000) unshare(0x80) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) unshare(0x480) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) unshare(0x4010300) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) 04:07:25 executing program 5: unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) (async) unshare(0x8000000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async, rerun: 64) unshare(0x10000) (async, rerun: 64) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) (async) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async, rerun: 32) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (async, rerun: 32) unshare(0x2020000) lseek(r2, 0x1, 0x1) (async) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000017c20000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:25 executing program 1: unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) (async) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) (async) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x20000800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (async) unshare(0x2020000) (async, rerun: 32) lseek(r2, 0x1, 0x1) (async, rerun: 32) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3033.729045] EXT4-fs (loop3): Invalid log block size: 3171024896 04:07:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000002bd52000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:25 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x20000800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) semget$private(0x0, 0x0, 0x0) (async) unshare(0x0) (async) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) (async) unshare(0x80) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x20000800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (async) unshare(0x2020000) (async) lseek(r2, 0x1, 0x1) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) (async) [ 3034.059060] EXT4-fs (loop3): Invalid log block size: 3171024896 [ 3034.065339] EXT4-fs (loop4): #blocks per group too big: 16785408 04:07:25 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) unshare(0x8000000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) semget$private(0x0, 0x0, 0x0) (async) unshare(0x0) (async) semop(r0, 0x0, 0x0) (async) unshare(0x8000000) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) (async) unshare(0x80) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (async) unshare(0x2020000) (async) lseek(r2, 0x1, 0x1) (async) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) (async) [ 3034.103610] EXT4-fs (loop2): Invalid log cluster size: 4294967040 04:07:25 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) unshare(0x4000000) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) unshare(0x20000080) lseek(r2, 0x1, 0x1) unshare(0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000009c20000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000002bd53000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:25 executing program 1: unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) (async) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x80) (async) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) unshare(0x4000000) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (async) unshare(0x2020000) unshare(0x20000080) (async) lseek(r2, 0x1, 0x1) (async) unshare(0x0) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000002fa2000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3034.398572] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3034.404393] EXT4-fs (loop3): Invalid log block size: 3171024896 [ 3034.545206] EXT4-fs (loop2): Invalid log cluster size: 33554432 04:07:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x10000) unshare(0x80) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) unshare(0x480) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) unshare(0x4010300) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) unshare(0x18010100) (async) unshare(0x10000) (async) unshare(0x80) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async) unshare(0x480) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) unshare(0x4010300) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) (async) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) 04:07:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000000000000000200003ac20000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:26 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x20020100) unshare(0x100) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) unshare(0x100) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000002bd54000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:26 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) (async) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x80) (async) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) (async) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) unshare(0x4000000) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) (async) unshare(0x20000080) lseek(r2, 0x1, 0x1) (async) unshare(0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000fffffffb2000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3034.662863] EXT4-fs (loop3): Invalid log block size: 3171024896 [ 3034.676981] EXT4-fs (loop4): #blocks per group too big: 50339840 04:07:26 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x9, 0x0, 0x0, 0x0, 0x400, 0x4, 0x3f, 0x0, 0x80000001}, 0x0, 0xfffffffffff7ffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0x20000000000c, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000001c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000240)={r3, 0x3, 0xffffffffffffffff, 0x4}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, &(0x7f00000000c0)={r3, 0x8, 0x7}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xa8240, 0x0) 04:07:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) unshare(0x18010100) (async) unshare(0x10000) unshare(0x80) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) unshare(0x480) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) unshare(0x4010300) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) (async) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) 04:07:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x20040000) unshare(0x34020d80) unshare(0x40080) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) 04:07:26 executing program 5: unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) (async) unshare(0x0) semop(r0, 0x0, 0x0) (async, rerun: 64) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async, rerun: 64) unshare(0x10000) (async) unshare(0x20020100) unshare(0x100) (async) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) unshare(0x100) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) (async, rerun: 32) lseek(r2, 0x1, 0x1) (rerun: 32) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000002bd55000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3034.864094] EXT4-fs (loop2): Invalid log cluster size: 4294967040 04:07:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000fffffdfc2000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:26 executing program 1: unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x9, 0x0, 0x0, 0x0, 0x400, 0x4, 0x3f, 0x0, 0x80000001}, 0x0, 0xfffffffffff7ffff, 0xffffffffffffffff, 0x0) (async) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) (async) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) (async) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0x20000000000c, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (async) unshare(0x2020000) (async) lseek(r2, 0x1, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000001c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000240)={r3, 0x3, 0xffffffffffffffff, 0x4}) (async) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, &(0x7f00000000c0)={r3, 0x8, 0x7}) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xa8240, 0x0) 04:07:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000000000000000200000c020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:26 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x9, 0x0, 0x0, 0x0, 0x400, 0x4, 0x3f, 0x0, 0x80000001}, 0x0, 0xfffffffffff7ffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0x20000000000c, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000001c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000240)={r3, 0x3, 0xffffffffffffffff, 0x4}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, &(0x7f00000000c0)={r3, 0x8, 0x7}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xa8240, 0x0) unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x9, 0x0, 0x0, 0x0, 0x400, 0x4, 0x3f, 0x0, 0x80000001}, 0x0, 0xfffffffffff7ffff, 0xffffffffffffffff, 0x0) (async) semget$private(0x0, 0x0, 0x0) (async) unshare(0x0) (async) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) (async) unshare(0x80) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0x20000000000c, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (async) unshare(0x2020000) (async) lseek(r2, 0x1, 0x1) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000001c0)) (async) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000240)={r3, 0x3, 0xffffffffffffffff, 0x4}) (async) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, &(0x7f00000000c0)={r3, 0x8, 0x7}) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xa8240, 0x0) (async) [ 3035.077861] EXT4-fs (loop3): Invalid log block size: 3171024896 [ 3035.084550] EXT4-fs (loop2): Invalid log cluster size: 4261412608 [ 3035.098583] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000fffffdfd2000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000000000000000200003d020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000056000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:26 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = semget$private(0x0, 0x0, 0x0) (async) unshare(0x0) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) (async) unshare(0x20020100) (async) unshare(0x100) (async) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) unshare(0x100) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) (async) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:26 executing program 1: ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, &(0x7f00000000c0)={0x8000000, 0x6, 0x1}) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000040)) unshare(0x0) r3 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r3, 0x1, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3035.275216] EXT4-fs (loop3): Invalid log cluster size: 86 [ 3035.288505] EXT4-fs (loop2): Invalid log cluster size: 4261412608 [ 3035.490079] EXT4-fs (loop4): #blocks per group too big: 50339840 04:07:27 executing program 1: ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, &(0x7f00000000c0)={0x8000000, 0x6, 0x1}) unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = semget$private(0x0, 0x0, 0x0) (async) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000040)) unshare(0x0) (async) r3 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) (async) lseek(r3, 0x1, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:27 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x20040000) unshare(0x34020d80) unshare(0x40080) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) unshare(0x18010100) (async) unshare(0x20040000) (async) unshare(0x34020d80) (async) unshare(0x40080) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) (async) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) 04:07:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000002bd56000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000000000000000200000fc20000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000fffffffe2000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:27 executing program 5: unshare(0x40010000) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0xfffffffffffffffd, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:27 executing program 1: ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, &(0x7f00000000c0)={0x8000000, 0x6, 0x1}) (async) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) (async) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) (async) unshare(0x80) (async) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000040)) (async) unshare(0x0) r3 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (async) unshare(0x2020000) (async) lseek(r3, 0x1, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3035.745008] EXT4-fs (loop3): Invalid log block size: 3171024896 04:07:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000002bd57000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:27 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) (async) unshare(0x20040000) unshare(0x34020d80) unshare(0x40080) (async) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) [ 3035.803769] EXT4-fs (loop2): Invalid log cluster size: 4294967040 04:07:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000000000000fff2000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:27 executing program 5: unshare(0x40010000) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0xfffffffffffffffd, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) unshare(0x40010000) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) semget$private(0x0, 0x0, 0x0) (async) unshare(0x0) (async) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) (async) unshare(0x80) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (async) unshare(0x2020000) (async) lseek(r2, 0x1, 0x1) (async) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0xfffffffffffffffd, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) (async) [ 3035.927007] EXT4-fs (loop3): Invalid log block size: 3171024896 [ 3035.935900] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:27 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) r1 = semget$private(0x0, 0x0, 0x0) semctl$IPC_RMID(r1, 0x0, 0x0) semctl$GETZCNT(r1, 0x0, 0xf, &(0x7f00000002c0)=""/4096) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r3 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xb) unshare(0x2020000) lseek(r3, 0x1, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000002bd58000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000000000000000200003fc20000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:27 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) r1 = semget$private(0x0, 0x0, 0x0) semctl$IPC_RMID(r1, 0x0, 0x0) semctl$GETZCNT(r1, 0x0, 0xf, &(0x7f00000002c0)=""/4096) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r3 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xb) unshare(0x2020000) lseek(r3, 0x1, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) semget$private(0x0, 0x0, 0x0) (async) unshare(0x0) (async) semop(r0, 0x0, 0x0) (async) semget$private(0x0, 0x0, 0x0) (async) semctl$IPC_RMID(r1, 0x0, 0x0) (async) semctl$GETZCNT(r1, 0x0, 0xf, &(0x7f00000002c0)=""/4096) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) (async) unshare(0x80) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) (async) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xb) (async) unshare(0x2020000) (async) lseek(r3, 0x1, 0x1) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) (async) 04:07:27 executing program 5: unshare(0x40010000) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0xfffffffffffffffd, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) unshare(0x40010000) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) semget$private(0x0, 0x0, 0x0) (async) unshare(0x0) (async) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) (async) unshare(0x80) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (async) unshare(0x2020000) (async) lseek(r2, 0x1, 0x1) (async) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0xfffffffffffffffd, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) (async) [ 3036.307672] EXT4-fs (loop2): Invalid log cluster size: 251658240 04:07:27 executing program 1: unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) (async) semop(r0, 0x0, 0x0) (async) r1 = semget$private(0x0, 0x0, 0x0) semctl$IPC_RMID(r1, 0x0, 0x0) (async) semctl$GETZCNT(r1, 0x0, 0xf, &(0x7f00000002c0)=""/4096) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) (async) unshare(0x80) (async) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) r3 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xb) (async) unshare(0x2020000) (async) lseek(r3, 0x1, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3036.391911] EXT4-fs (loop4): #blocks per group too big: 50339840 04:07:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000001fffff2000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000000000020000fff20000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:28 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x80040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x40200) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x16000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) r3 = ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r3) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x40480, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r3) [ 3036.468870] EXT4-fs (loop3): Invalid log block size: 3171024896 04:07:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000005c000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000060000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:28 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000280), 0x501040, 0x0) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x80, 0x7f, 0x4, 0x6, 0x0, 0x9, 0x144, 0xb, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f00000001c0), 0xe}, 0x2009, 0x40, 0x200, 0x2, 0x4, 0x10000, 0x435, 0x0, 0x9a, 0x0, 0x8000000000000000}, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0x2) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r3 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) pipe(&(0x7f00000000c0)) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xb) lseek(r3, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x3a2f}, &(0x7f00000002c0)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300)={[0x1]}, 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:28 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x8000}}, './file0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=@newtfilter={0x8ec, 0x2c, 0x2, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x6, 0xb}, {0xc, 0xc}, {0x10, 0xfff1}}, [@TCA_RATE={0x6, 0x5, {0x8, 0x6}}, @filter_kind_options=@f_bpf={{0x8}, {0x888, 0x2, [@TCA_BPF_OPS={{0x6, 0x4, 0x8}, {0x44, 0x5, [{0x62, 0x27, 0x8, 0x80}, {0x9, 0x80, 0x40, 0x3}, {0xfffe, 0x0, 0x9, 0x3f}, {0x3bd0, 0x9, 0x96, 0x7}, {0x0, 0x3, 0x1, 0x3f}, {0x0, 0x3f, 0xf2, 0x3}, {0x7fff, 0x20, 0x81, 0x1f}, {0x4, 0x9, 0x3, 0x1}]}}, @TCA_BPF_POLICE={0x414, 0x2, [@TCA_POLICE_RATE64={0xc}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x251, 0x7, 0x800, 0x0, 0x0, 0x6, 0x47, 0x3, 0x72, 0x7, 0x101, 0x3, 0x6, 0x6, 0x8001, 0x1ff, 0x13a, 0xffffffff, 0x1, 0x6, 0x1f, 0x80, 0x6, 0x7, 0xee7, 0x8, 0xffffff6a, 0xb463, 0x81, 0x7, 0xfff, 0x0, 0x7f, 0x5, 0x7, 0x6, 0x1f, 0x80, 0x0, 0x8, 0x5, 0x80000001, 0x4, 0x9, 0x1f, 0x1, 0x101, 0x6b, 0x4, 0x45ba, 0x4, 0xfffff2d5, 0x5, 0x849, 0x5, 0x401, 0x5, 0x1, 0xc5, 0x1, 0x2, 0x7, 0xcb, 0x6, 0x1, 0x1, 0x6, 0x3, 0x1, 0x2, 0x2, 0x2, 0x4, 0x7, 0x800, 0x1ff, 0x2, 0x7, 0x80, 0x100, 0xe607, 0x80000001, 0x8, 0x3, 0x3efa, 0xd1, 0x5, 0xffffff80, 0x4, 0x0, 0x0, 0x80, 0x7, 0x5, 0x7ff, 0xfffffffc, 0x40, 0x1, 0x5, 0x0, 0x1, 0x4, 0x7fffffff, 0xf60, 0x80000000, 0x0, 0xdb, 0x77c0000, 0x0, 0xff, 0x5, 0x6, 0x0, 0x124e, 0x53, 0x2, 0x0, 0x8, 0xb3, 0x5, 0xfe000000, 0x4, 0x9, 0x2, 0x100, 0xa71, 0x2, 0x6, 0x17, 0x2, 0xb, 0x3, 0x1966, 0x9, 0xa7f, 0x92e, 0x5, 0x30, 0x16bc6f28, 0x7ff, 0x2, 0x4, 0x80000000, 0xe23a, 0x3f, 0xf33b, 0x4, 0xffff, 0x3, 0x1000, 0x7fff, 0x5, 0x6, 0x1f, 0x7ff, 0xffffffff, 0xfffffff7, 0x4, 0x3, 0x7, 0x9, 0x8, 0x4, 0x9, 0x2, 0x9, 0x400, 0x1, 0x1000, 0x9, 0x3ff, 0x3, 0x800, 0xfffffe13, 0x2, 0x99c8, 0x4, 0x8, 0x800, 0xfffffffd, 0x0, 0x0, 0x400, 0x8, 0x9, 0x80000000, 0xfffffbff, 0xaf4d, 0x8001, 0x8001, 0x7ff, 0x8, 0x4, 0x4, 0x80000001, 0x0, 0x0, 0x8a42, 0xff, 0xffff, 0xa2000, 0xffffff9d, 0x20, 0xfbf, 0x2, 0x4, 0x40, 0x200, 0x5, 0xc1bbdfa, 0x200, 0x5, 0x2, 0x3fffffff, 0x0, 0x2, 0x100, 0x0, 0x789b, 0x5, 0x100, 0x400, 0x800, 0xa82, 0x200, 0x7fffffff, 0x101, 0x1, 0xffff7fff, 0x0, 0x7, 0x3, 0xffff, 0x7, 0x8, 0x8, 0x0, 0x8, 0x6, 0x8, 0x4, 0x3, 0x5, 0x401, 0x7b7b, 0x3, 0xd1, 0x8, 0x101, 0x1f, 0x7f, 0x56c, 0x8, 0x7ff, 0x4]}]}, @TCA_BPF_OPS={{0x6, 0x4, 0x1}, {0xc, 0x5, [{0x200, 0x8, 0x81, 0x5}]}}, @TCA_BPF_FD={0x8, 0x6, r1}, @TCA_BPF_POLICE={0x408, 0x2, [@TCA_POLICE_RATE={0x404, 0x2, [0x0, 0x800, 0x2, 0x5, 0x8, 0x9, 0x40, 0x20, 0x1f, 0x10001, 0x8e88, 0xffffff0a, 0x7, 0x8, 0x8, 0x1, 0xffffffd3, 0x4, 0x6, 0x76, 0x8000, 0xe2, 0x9, 0xed, 0x200, 0x2, 0x9, 0x8, 0x40, 0x2e, 0xfffffffe, 0xfffffff8, 0x80000001, 0x0, 0x100, 0x20, 0x5, 0x1000000, 0x8, 0xa98, 0x4, 0x10000, 0xbda4, 0x8, 0x8001, 0x100, 0x1f, 0x100, 0x0, 0x0, 0x91, 0x1, 0x9, 0x3f, 0x7c3, 0x1000, 0x4087, 0x10000, 0x0, 0x5294, 0x2, 0x24c, 0x6, 0x1, 0xe51, 0x8, 0x4, 0x1, 0x9, 0xe000000, 0x800, 0x6, 0x40, 0x0, 0xfff, 0x200, 0x2f, 0x3ff, 0x7f, 0x40, 0x8, 0x7f, 0x10000, 0x8000, 0x0, 0x100, 0x6, 0x8000, 0x9, 0x8, 0x1, 0x4494, 0x401, 0x8, 0x8, 0x4, 0xdd4, 0xff, 0x2, 0x400, 0x0, 0x4, 0x1, 0x401, 0x2273, 0x0, 0x7, 0x6, 0x2, 0x4, 0x0, 0x4, 0x9, 0x8, 0x8, 0x5, 0x80, 0x0, 0xfffffffe, 0x7f, 0x5, 0x7ff, 0x2, 0x3, 0x7, 0x7f, 0x0, 0x8, 0x1000, 0x400, 0x7, 0x4, 0x4, 0xb44, 0x7, 0x3, 0x4, 0xfffffffa, 0x3fcd8ee3, 0x2691, 0x0, 0x9, 0x8, 0x7, 0x4, 0x5, 0xf7, 0x7ff, 0xcf02, 0x1, 0x4, 0x6, 0xffffffc0, 0x3, 0x8000, 0xc18, 0xaa, 0x0, 0x20, 0x401, 0x1, 0xffff, 0x910, 0x7, 0x1, 0x0, 0x800, 0x9, 0x2, 0x7e56, 0xffff, 0x6, 0x0, 0x5, 0x1, 0x0, 0xf3, 0x4, 0x0, 0xfffffe00, 0x40, 0x8, 0x8, 0x81, 0x4, 0x3f, 0xdc9, 0x40, 0x1f, 0x2d, 0x1, 0x3, 0x5a11, 0x1, 0x80000001, 0xcbc8, 0x7, 0x4, 0x2000000, 0x2, 0xff, 0x1, 0x8, 0x4, 0x4, 0x0, 0x7fffffff, 0x401, 0x1, 0x1, 0xfffff001, 0x60000, 0x81, 0x0, 0x3ff, 0x13, 0xe9a, 0x808d, 0x32b, 0x5, 0x401, 0x10001, 0x80000001, 0x5, 0x4, 0x0, 0x8511, 0x57, 0x8, 0xff, 0x0, 0x5, 0x7, 0xffffff80, 0x10000, 0x401, 0xff, 0x1000, 0x4, 0x80000000, 0x8000, 0x400, 0x5, 0x6, 0x7, 0x0, 0x0, 0x1, 0x3, 0xaf83, 0x8, 0x2, 0x7, 0x4, 0x400, 0x9]}]}]}}, @TCA_RATE={0x6, 0x5, {0x5, 0x56}}, @TCA_CHAIN={0x8, 0xb, 0x400}, @TCA_RATE={0x6, 0x5, {0x76, 0x1f}}, @TCA_RATE={0x6, 0x5, {0xfc, 0x8}}, @TCA_CHAIN={0x8, 0xb, 0x8}, @TCA_CHAIN={0x8, 0xb, 0x10001}]}, 0x8ec}, 0x1, 0x0, 0x0, 0x1}, 0x1) unshare(0x10000) unshare(0x80) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000b00), 0x2000, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r3, 0x810c9365, &(0x7f0000000b40)={{0x0, 0x7ff}, 0x100, './file0\x00'}) 04:07:28 executing program 1: unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x80040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x40200) (async) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) (async) unshare(0x16000000) (async) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) (async) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) r3 = ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r3) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) (async) lseek(r2, 0x1, 0x1) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x40480, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r3) [ 3036.778734] EXT4-fs (loop2): Invalid log cluster size: 4280221696 [ 3036.793488] EXT4-fs (loop3): Invalid log cluster size: 92 04:07:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000007fffffff2000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000060000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:28 executing program 5: unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) (async) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) unshare(0x80) (async) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000280), 0x501040, 0x0) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x80, 0x7f, 0x4, 0x6, 0x0, 0x9, 0x144, 0xb, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f00000001c0), 0xe}, 0x2009, 0x40, 0x200, 0x2, 0x4, 0x10000, 0x435, 0x0, 0x9a, 0x0, 0x8000000000000000}, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0x2) (async) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) r3 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) pipe(&(0x7f00000000c0)) (async) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xb) (async) lseek(r3, 0x1, 0x1) (async) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x3a2f}, &(0x7f00000002c0)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300)={[0x1]}, 0x8}) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:28 executing program 1: unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x80040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x40200) (async) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) (async) unshare(0x16000000) (async) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) r3 = ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r3) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) (async) lseek(r2, 0x1, 0x1) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x40480, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r3) 04:07:28 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x4683c, 0x9b, 0x6e, 0x9, 0x4000000000, 0x9, 0x66b, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000174000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3036.977915] EXT4-fs (loop3): Invalid log cluster size: 96 [ 3036.999948] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3037.016808] EXT4-fs (loop2): Invalid log cluster size: 4294934272 04:07:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000000200020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000ffffffff2000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:28 executing program 5: unshare(0x0) (async, rerun: 32) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) (async) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000280), 0x501040, 0x0) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x80, 0x7f, 0x4, 0x6, 0x0, 0x9, 0x144, 0xb, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f00000001c0), 0xe}, 0x2009, 0x40, 0x200, 0x2, 0x4, 0x10000, 0x435, 0x0, 0x9a, 0x0, 0x8000000000000000}, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0x2) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) (async) r3 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) (async, rerun: 32) pipe(&(0x7f00000000c0)) (async, rerun: 32) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xb) (async) lseek(r3, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x3a2f}, &(0x7f00000002c0)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300)={[0x1]}, 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:28 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x4683c, 0x9b, 0x6e, 0x9, 0x4000000000, 0x9, 0x66b, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) semget$private(0x0, 0x0, 0x0) (async) unshare(0x0) (async) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) (async) unshare(0x80) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x4683c, 0x9b, 0x6e, 0x9, 0x4000000000, 0x9, 0x66b, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0x0) (async) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (async) unshare(0x2020000) (async) lseek(r2, 0x1, 0x1) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) (async) [ 3037.344648] EXT4-fs (loop3): Invalid log block size: 16777216 [ 3037.444252] EXT4-fs (loop2): Invalid log cluster size: 4294967040 04:07:29 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) (async) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x8000}}, './file0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=@newtfilter={0x8ec, 0x2c, 0x2, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x6, 0xb}, {0xc, 0xc}, {0x10, 0xfff1}}, [@TCA_RATE={0x6, 0x5, {0x8, 0x6}}, @filter_kind_options=@f_bpf={{0x8}, {0x888, 0x2, [@TCA_BPF_OPS={{0x6, 0x4, 0x8}, {0x44, 0x5, [{0x62, 0x27, 0x8, 0x80}, {0x9, 0x80, 0x40, 0x3}, {0xfffe, 0x0, 0x9, 0x3f}, {0x3bd0, 0x9, 0x96, 0x7}, {0x0, 0x3, 0x1, 0x3f}, {0x0, 0x3f, 0xf2, 0x3}, {0x7fff, 0x20, 0x81, 0x1f}, {0x4, 0x9, 0x3, 0x1}]}}, @TCA_BPF_POLICE={0x414, 0x2, [@TCA_POLICE_RATE64={0xc}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x251, 0x7, 0x800, 0x0, 0x0, 0x6, 0x47, 0x3, 0x72, 0x7, 0x101, 0x3, 0x6, 0x6, 0x8001, 0x1ff, 0x13a, 0xffffffff, 0x1, 0x6, 0x1f, 0x80, 0x6, 0x7, 0xee7, 0x8, 0xffffff6a, 0xb463, 0x81, 0x7, 0xfff, 0x0, 0x7f, 0x5, 0x7, 0x6, 0x1f, 0x80, 0x0, 0x8, 0x5, 0x80000001, 0x4, 0x9, 0x1f, 0x1, 0x101, 0x6b, 0x4, 0x45ba, 0x4, 0xfffff2d5, 0x5, 0x849, 0x5, 0x401, 0x5, 0x1, 0xc5, 0x1, 0x2, 0x7, 0xcb, 0x6, 0x1, 0x1, 0x6, 0x3, 0x1, 0x2, 0x2, 0x2, 0x4, 0x7, 0x800, 0x1ff, 0x2, 0x7, 0x80, 0x100, 0xe607, 0x80000001, 0x8, 0x3, 0x3efa, 0xd1, 0x5, 0xffffff80, 0x4, 0x0, 0x0, 0x80, 0x7, 0x5, 0x7ff, 0xfffffffc, 0x40, 0x1, 0x5, 0x0, 0x1, 0x4, 0x7fffffff, 0xf60, 0x80000000, 0x0, 0xdb, 0x77c0000, 0x0, 0xff, 0x5, 0x6, 0x0, 0x124e, 0x53, 0x2, 0x0, 0x8, 0xb3, 0x5, 0xfe000000, 0x4, 0x9, 0x2, 0x100, 0xa71, 0x2, 0x6, 0x17, 0x2, 0xb, 0x3, 0x1966, 0x9, 0xa7f, 0x92e, 0x5, 0x30, 0x16bc6f28, 0x7ff, 0x2, 0x4, 0x80000000, 0xe23a, 0x3f, 0xf33b, 0x4, 0xffff, 0x3, 0x1000, 0x7fff, 0x5, 0x6, 0x1f, 0x7ff, 0xffffffff, 0xfffffff7, 0x4, 0x3, 0x7, 0x9, 0x8, 0x4, 0x9, 0x2, 0x9, 0x400, 0x1, 0x1000, 0x9, 0x3ff, 0x3, 0x800, 0xfffffe13, 0x2, 0x99c8, 0x4, 0x8, 0x800, 0xfffffffd, 0x0, 0x0, 0x400, 0x8, 0x9, 0x80000000, 0xfffffbff, 0xaf4d, 0x8001, 0x8001, 0x7ff, 0x8, 0x4, 0x4, 0x80000001, 0x0, 0x0, 0x8a42, 0xff, 0xffff, 0xa2000, 0xffffff9d, 0x20, 0xfbf, 0x2, 0x4, 0x40, 0x200, 0x5, 0xc1bbdfa, 0x200, 0x5, 0x2, 0x3fffffff, 0x0, 0x2, 0x100, 0x0, 0x789b, 0x5, 0x100, 0x400, 0x800, 0xa82, 0x200, 0x7fffffff, 0x101, 0x1, 0xffff7fff, 0x0, 0x7, 0x3, 0xffff, 0x7, 0x8, 0x8, 0x0, 0x8, 0x6, 0x8, 0x4, 0x3, 0x5, 0x401, 0x7b7b, 0x3, 0xd1, 0x8, 0x101, 0x1f, 0x7f, 0x56c, 0x8, 0x7ff, 0x4]}]}, @TCA_BPF_OPS={{0x6, 0x4, 0x1}, {0xc, 0x5, [{0x200, 0x8, 0x81, 0x5}]}}, @TCA_BPF_FD={0x8, 0x6, r1}, @TCA_BPF_POLICE={0x408, 0x2, [@TCA_POLICE_RATE={0x404, 0x2, [0x0, 0x800, 0x2, 0x5, 0x8, 0x9, 0x40, 0x20, 0x1f, 0x10001, 0x8e88, 0xffffff0a, 0x7, 0x8, 0x8, 0x1, 0xffffffd3, 0x4, 0x6, 0x76, 0x8000, 0xe2, 0x9, 0xed, 0x200, 0x2, 0x9, 0x8, 0x40, 0x2e, 0xfffffffe, 0xfffffff8, 0x80000001, 0x0, 0x100, 0x20, 0x5, 0x1000000, 0x8, 0xa98, 0x4, 0x10000, 0xbda4, 0x8, 0x8001, 0x100, 0x1f, 0x100, 0x0, 0x0, 0x91, 0x1, 0x9, 0x3f, 0x7c3, 0x1000, 0x4087, 0x10000, 0x0, 0x5294, 0x2, 0x24c, 0x6, 0x1, 0xe51, 0x8, 0x4, 0x1, 0x9, 0xe000000, 0x800, 0x6, 0x40, 0x0, 0xfff, 0x200, 0x2f, 0x3ff, 0x7f, 0x40, 0x8, 0x7f, 0x10000, 0x8000, 0x0, 0x100, 0x6, 0x8000, 0x9, 0x8, 0x1, 0x4494, 0x401, 0x8, 0x8, 0x4, 0xdd4, 0xff, 0x2, 0x400, 0x0, 0x4, 0x1, 0x401, 0x2273, 0x0, 0x7, 0x6, 0x2, 0x4, 0x0, 0x4, 0x9, 0x8, 0x8, 0x5, 0x80, 0x0, 0xfffffffe, 0x7f, 0x5, 0x7ff, 0x2, 0x3, 0x7, 0x7f, 0x0, 0x8, 0x1000, 0x400, 0x7, 0x4, 0x4, 0xb44, 0x7, 0x3, 0x4, 0xfffffffa, 0x3fcd8ee3, 0x2691, 0x0, 0x9, 0x8, 0x7, 0x4, 0x5, 0xf7, 0x7ff, 0xcf02, 0x1, 0x4, 0x6, 0xffffffc0, 0x3, 0x8000, 0xc18, 0xaa, 0x0, 0x20, 0x401, 0x1, 0xffff, 0x910, 0x7, 0x1, 0x0, 0x800, 0x9, 0x2, 0x7e56, 0xffff, 0x6, 0x0, 0x5, 0x1, 0x0, 0xf3, 0x4, 0x0, 0xfffffe00, 0x40, 0x8, 0x8, 0x81, 0x4, 0x3f, 0xdc9, 0x40, 0x1f, 0x2d, 0x1, 0x3, 0x5a11, 0x1, 0x80000001, 0xcbc8, 0x7, 0x4, 0x2000000, 0x2, 0xff, 0x1, 0x8, 0x4, 0x4, 0x0, 0x7fffffff, 0x401, 0x1, 0x1, 0xfffff001, 0x60000, 0x81, 0x0, 0x3ff, 0x13, 0xe9a, 0x808d, 0x32b, 0x5, 0x401, 0x10001, 0x80000001, 0x5, 0x4, 0x0, 0x8511, 0x57, 0x8, 0xff, 0x0, 0x5, 0x7, 0xffffff80, 0x10000, 0x401, 0xff, 0x1000, 0x4, 0x80000000, 0x8000, 0x400, 0x5, 0x6, 0x7, 0x0, 0x0, 0x1, 0x3, 0xaf83, 0x8, 0x2, 0x7, 0x4, 0x400, 0x9]}]}]}}, @TCA_RATE={0x6, 0x5, {0x5, 0x56}}, @TCA_CHAIN={0x8, 0xb, 0x400}, @TCA_RATE={0x6, 0x5, {0x76, 0x1f}}, @TCA_RATE={0x6, 0x5, {0xfc, 0x8}}, @TCA_CHAIN={0x8, 0xb, 0x8}, @TCA_CHAIN={0x8, 0xb, 0x10001}]}, 0x8ec}, 0x1, 0x0, 0x0, 0x1}, 0x1) (async) unshare(0x10000) (async) unshare(0x80) (async) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async, rerun: 32) unshare(0x0) (rerun: 32) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000b00), 0x2000, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r3, 0x810c9365, &(0x7f0000000b40)={{0x0, 0x7ff}, 0x100, './file0\x00'}) 04:07:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000017c000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000006088ffffffff2000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:29 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x1}, 0x1b98, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x3, 0x0) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:29 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) (async) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) (async) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) r2 = perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x4683c, 0x9b, 0x6e, 0x9, 0x4000000000, 0x9, 0x66b, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (async) unshare(0x2020000) lseek(r2, 0x1, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000400000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3037.630221] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:29 executing program 1: ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, &(0x7f00000000c0)={0x8000000, 0x6, 0x1}) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000040)) unshare(0x0) r3 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r3, 0x1, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:29 executing program 5: unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x1}, 0x1b98, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) (async) unshare(0x80) (async) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) (async) lseek(r2, 0x3, 0x0) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000006088000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3037.819495] EXT4-fs (loop3): Invalid log block size: 16777216 [ 3037.819502] EXT4-fs (loop2): Invalid log block size: 1610612736 04:07:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000007ffffffffffff2000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:29 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x1}, 0x1b98, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) (async, rerun: 32) r0 = semget$private(0x0, 0x0, 0x0) (rerun: 32) unshare(0x0) (async) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) (async, rerun: 32) unshare(0x80) (rerun: 32) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) (async, rerun: 64) lseek(r2, 0x3, 0x0) (async, rerun: 64) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000220000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3038.049955] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3038.116510] EXT4-fs (loop3): Invalid log block size: 1610612736 [ 3038.293295] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3038.321769] EXT4-fs (loop2): Invalid log block size: 4278648832 04:07:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000ffffff8c000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:30 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x20020100) unshare(0x100) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) unshare(0x100) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:30 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x8000}}, './file0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=@newtfilter={0x8ec, 0x2c, 0x2, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x6, 0xb}, {0xc, 0xc}, {0x10, 0xfff1}}, [@TCA_RATE={0x6, 0x5, {0x8, 0x6}}, @filter_kind_options=@f_bpf={{0x8}, {0x888, 0x2, [@TCA_BPF_OPS={{0x6, 0x4, 0x8}, {0x44, 0x5, [{0x62, 0x27, 0x8, 0x80}, {0x9, 0x80, 0x40, 0x3}, {0xfffe, 0x0, 0x9, 0x3f}, {0x3bd0, 0x9, 0x96, 0x7}, {0x0, 0x3, 0x1, 0x3f}, {0x0, 0x3f, 0xf2, 0x3}, {0x7fff, 0x20, 0x81, 0x1f}, {0x4, 0x9, 0x3, 0x1}]}}, @TCA_BPF_POLICE={0x414, 0x2, [@TCA_POLICE_RATE64={0xc}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x251, 0x7, 0x800, 0x0, 0x0, 0x6, 0x47, 0x3, 0x72, 0x7, 0x101, 0x3, 0x6, 0x6, 0x8001, 0x1ff, 0x13a, 0xffffffff, 0x1, 0x6, 0x1f, 0x80, 0x6, 0x7, 0xee7, 0x8, 0xffffff6a, 0xb463, 0x81, 0x7, 0xfff, 0x0, 0x7f, 0x5, 0x7, 0x6, 0x1f, 0x80, 0x0, 0x8, 0x5, 0x80000001, 0x4, 0x9, 0x1f, 0x1, 0x101, 0x6b, 0x4, 0x45ba, 0x4, 0xfffff2d5, 0x5, 0x849, 0x5, 0x401, 0x5, 0x1, 0xc5, 0x1, 0x2, 0x7, 0xcb, 0x6, 0x1, 0x1, 0x6, 0x3, 0x1, 0x2, 0x2, 0x2, 0x4, 0x7, 0x800, 0x1ff, 0x2, 0x7, 0x80, 0x100, 0xe607, 0x80000001, 0x8, 0x3, 0x3efa, 0xd1, 0x5, 0xffffff80, 0x4, 0x0, 0x0, 0x80, 0x7, 0x5, 0x7ff, 0xfffffffc, 0x40, 0x1, 0x5, 0x0, 0x1, 0x4, 0x7fffffff, 0xf60, 0x80000000, 0x0, 0xdb, 0x77c0000, 0x0, 0xff, 0x5, 0x6, 0x0, 0x124e, 0x53, 0x2, 0x0, 0x8, 0xb3, 0x5, 0xfe000000, 0x4, 0x9, 0x2, 0x100, 0xa71, 0x2, 0x6, 0x17, 0x2, 0xb, 0x3, 0x1966, 0x9, 0xa7f, 0x92e, 0x5, 0x30, 0x16bc6f28, 0x7ff, 0x2, 0x4, 0x80000000, 0xe23a, 0x3f, 0xf33b, 0x4, 0xffff, 0x3, 0x1000, 0x7fff, 0x5, 0x6, 0x1f, 0x7ff, 0xffffffff, 0xfffffff7, 0x4, 0x3, 0x7, 0x9, 0x8, 0x4, 0x9, 0x2, 0x9, 0x400, 0x1, 0x1000, 0x9, 0x3ff, 0x3, 0x800, 0xfffffe13, 0x2, 0x99c8, 0x4, 0x8, 0x800, 0xfffffffd, 0x0, 0x0, 0x400, 0x8, 0x9, 0x80000000, 0xfffffbff, 0xaf4d, 0x8001, 0x8001, 0x7ff, 0x8, 0x4, 0x4, 0x80000001, 0x0, 0x0, 0x8a42, 0xff, 0xffff, 0xa2000, 0xffffff9d, 0x20, 0xfbf, 0x2, 0x4, 0x40, 0x200, 0x5, 0xc1bbdfa, 0x200, 0x5, 0x2, 0x3fffffff, 0x0, 0x2, 0x100, 0x0, 0x789b, 0x5, 0x100, 0x400, 0x800, 0xa82, 0x200, 0x7fffffff, 0x101, 0x1, 0xffff7fff, 0x0, 0x7, 0x3, 0xffff, 0x7, 0x8, 0x8, 0x0, 0x8, 0x6, 0x8, 0x4, 0x3, 0x5, 0x401, 0x7b7b, 0x3, 0xd1, 0x8, 0x101, 0x1f, 0x7f, 0x56c, 0x8, 0x7ff, 0x4]}]}, @TCA_BPF_OPS={{0x6, 0x4, 0x1}, {0xc, 0x5, [{0x200, 0x8, 0x81, 0x5}]}}, @TCA_BPF_FD={0x8, 0x6, r1}, @TCA_BPF_POLICE={0x408, 0x2, [@TCA_POLICE_RATE={0x404, 0x2, [0x0, 0x800, 0x2, 0x5, 0x8, 0x9, 0x40, 0x20, 0x1f, 0x10001, 0x8e88, 0xffffff0a, 0x7, 0x8, 0x8, 0x1, 0xffffffd3, 0x4, 0x6, 0x76, 0x8000, 0xe2, 0x9, 0xed, 0x200, 0x2, 0x9, 0x8, 0x40, 0x2e, 0xfffffffe, 0xfffffff8, 0x80000001, 0x0, 0x100, 0x20, 0x5, 0x1000000, 0x8, 0xa98, 0x4, 0x10000, 0xbda4, 0x8, 0x8001, 0x100, 0x1f, 0x100, 0x0, 0x0, 0x91, 0x1, 0x9, 0x3f, 0x7c3, 0x1000, 0x4087, 0x10000, 0x0, 0x5294, 0x2, 0x24c, 0x6, 0x1, 0xe51, 0x8, 0x4, 0x1, 0x9, 0xe000000, 0x800, 0x6, 0x40, 0x0, 0xfff, 0x200, 0x2f, 0x3ff, 0x7f, 0x40, 0x8, 0x7f, 0x10000, 0x8000, 0x0, 0x100, 0x6, 0x8000, 0x9, 0x8, 0x1, 0x4494, 0x401, 0x8, 0x8, 0x4, 0xdd4, 0xff, 0x2, 0x400, 0x0, 0x4, 0x1, 0x401, 0x2273, 0x0, 0x7, 0x6, 0x2, 0x4, 0x0, 0x4, 0x9, 0x8, 0x8, 0x5, 0x80, 0x0, 0xfffffffe, 0x7f, 0x5, 0x7ff, 0x2, 0x3, 0x7, 0x7f, 0x0, 0x8, 0x1000, 0x400, 0x7, 0x4, 0x4, 0xb44, 0x7, 0x3, 0x4, 0xfffffffa, 0x3fcd8ee3, 0x2691, 0x0, 0x9, 0x8, 0x7, 0x4, 0x5, 0xf7, 0x7ff, 0xcf02, 0x1, 0x4, 0x6, 0xffffffc0, 0x3, 0x8000, 0xc18, 0xaa, 0x0, 0x20, 0x401, 0x1, 0xffff, 0x910, 0x7, 0x1, 0x0, 0x800, 0x9, 0x2, 0x7e56, 0xffff, 0x6, 0x0, 0x5, 0x1, 0x0, 0xf3, 0x4, 0x0, 0xfffffe00, 0x40, 0x8, 0x8, 0x81, 0x4, 0x3f, 0xdc9, 0x40, 0x1f, 0x2d, 0x1, 0x3, 0x5a11, 0x1, 0x80000001, 0xcbc8, 0x7, 0x4, 0x2000000, 0x2, 0xff, 0x1, 0x8, 0x4, 0x4, 0x0, 0x7fffffff, 0x401, 0x1, 0x1, 0xfffff001, 0x60000, 0x81, 0x0, 0x3ff, 0x13, 0xe9a, 0x808d, 0x32b, 0x5, 0x401, 0x10001, 0x80000001, 0x5, 0x4, 0x0, 0x8511, 0x57, 0x8, 0xff, 0x0, 0x5, 0x7, 0xffffff80, 0x10000, 0x401, 0xff, 0x1000, 0x4, 0x80000000, 0x8000, 0x400, 0x5, 0x6, 0x7, 0x0, 0x0, 0x1, 0x3, 0xaf83, 0x8, 0x2, 0x7, 0x4, 0x400, 0x9]}]}]}}, @TCA_RATE={0x6, 0x5, {0x5, 0x56}}, @TCA_CHAIN={0x8, 0xb, 0x400}, @TCA_RATE={0x6, 0x5, {0x76, 0x1f}}, @TCA_RATE={0x6, 0x5, {0xfc, 0x8}}, @TCA_CHAIN={0x8, 0xb, 0x8}, @TCA_CHAIN={0x8, 0xb, 0x10001}]}, 0x8ec}, 0x1, 0x0, 0x0, 0x1}, 0x1) (async) unshare(0x10000) (async) unshare(0x80) (async, rerun: 32) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async, rerun: 32) clock_gettime(0x0, &(0x7f0000000140)) (async, rerun: 64) unshare(0x0) (rerun: 64) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async, rerun: 32) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) (rerun: 32) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000b00), 0x2000, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r3, 0x810c9365, &(0x7f0000000b40)={{0x0, 0x7ff}, 0x100, './file0\x00'}) 04:07:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000320000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000007fffffffffffffff2000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000420000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3038.706801] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3038.729155] EXT4-fs (loop3): Invalid log block size: 4294967040 [ 3038.735644] EXT4-fs (loop2): Invalid log block size: 4294934272 04:07:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000010000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:30 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) r3 = semget$private(0x0, 0x2, 0x510) semtimedop(r3, &(0x7f00000000c0)=[{0x0, 0x1}, {0x1, 0x9, 0x800}, {0x1, 0x27d, 0x800}, {0x0, 0x36}], 0x4, &(0x7f0000000100)={0x0, 0x989680}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000003a4000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:30 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x40000a00) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) clock_gettime(0x6, &(0x7f00000000c0)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:30 executing program 1: unshare(0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2005, 0x91}, 0x31, 0x0, 0x0, 0x7, 0x3, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) unshare(0x4040800) r3 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x7fffffffffffffff) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xb) unshare(0x44040400) unshare(0x2020000) lseek(r3, 0x1, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000040000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000520000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3039.053300] EXT4-fs (loop2): inodes count not valid: 32 vs 8160 [ 3039.081877] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3039.090278] EXT4-fs (loop3): Invalid log block size: 50331648 [ 3039.315541] IPVS: ftp: loaded support on port[0] = 21 04:07:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x10000) unshare(0x80) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) unshare(0x0) unshare(0x8000000) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x9, 0x1, 0x4, 0x80, 0x80000000}) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) unshare(0xa000000) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000240)="5b680278f936b7e7b7cf4dc3e0f1c3b411dffc2a21f32f4c025be790de28d09fdee93b5704ef0d875beab17911587a87a0721d1757c9ac58fe19364b08a959d66b245a95c60ea74397aa29805422f1eaa44dc0cfe3675be6c76d0c5fa2d76d331d4c14139389cd068c61e2f42e90c85794362cba485925fa9f8a4252ca1d30128c9f5a4a51f702bbb78145f2c33e70a1fe85b10464ae8ce38d844e1b7c19eb40eeb917918b0ab08a79f34d401913af18f48bc5cd52005fe274e4b1dcad2a879655e8ba43391433859f6db46fb8e820ffc2f352758d165e4c47c5f796de6cecbb04d7e2ce8d7cbdb20a42bf0ea1916c31045fe2d3d11458971fec542b622b5a62") pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) r2 = add_key(&(0x7f0000000000)='logon\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="04df84cf85ff42f07754528b7a67ed6842f8731c87d7138825e72c6575fe98756a952e7ea3f073794b858b0b3fea543c4bd8d14d4f8368af490edced2fd9", 0x3e, 0xfffffffffffffffc) keyctl$search(0xa, r2, &(0x7f00000001c0)='ceph\x00', &(0x7f0000000200)={'syz', 0x3}, 0xfffffffffffffffe) 04:07:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000003c0000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:30 executing program 5: unshare(0x0) (async, rerun: 32) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 32) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) (async) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x40000a00) (async) unshare(0x10000) (async, rerun: 32) unshare(0x80) (rerun: 32) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async, rerun: 64) clock_gettime(0x6, &(0x7f00000000c0)) (rerun: 64) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) (async) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3039.359584] EXT4-fs (loop2): inodes count not valid: 32 vs 2048 [ 3039.402232] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000180000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000620000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:31 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) (async) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x40000a00) unshare(0x10000) (async, rerun: 64) unshare(0x80) (rerun: 64) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async, rerun: 64) unshare(0x0) (rerun: 64) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) clock_gettime(0x6, &(0x7f00000000c0)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) (async) lseek(r2, 0x1, 0x1) (async) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async, rerun: 32) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) (rerun: 32) [ 3039.733770] EXT4-fs (loop3): Invalid log block size: 50331648 04:07:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000edc0000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3039.807536] EXT4-fs (loop2): inodes count not valid: 32 vs 352 04:07:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000200000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000720000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:31 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x2000000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:31 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x9, 0x81, 0x0, 0xe2, 0x0, 0xf5c8, 0x8000, 0xc, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f00000000c0), 0x9}, 0x40, 0x778, 0x1, 0x4, 0x100, 0xda0, 0x20, 0x0, 0x2e, 0x0, 0x7fffffff}, 0x0, 0x0, r3, 0xa) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:31 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) pselect6(0x40, &(0x7f00000000c0)={0x8, 0x6, 0x5, 0x1, 0x8, 0x3, 0x4, 0x800}, &(0x7f00000001c0)={0xff, 0x0, 0xffffffffffffff00, 0x6, 0x4, 0x4, 0x7, 0xfffffffffffffffb}, &(0x7f0000000200)={0x4, 0x0, 0xfff, 0xfffffffffffffffd, 0xfffffffffffffff8, 0x1, 0xbec4, 0xfffffffffffffc00}, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={&(0x7f0000000280)={[0x92ff]}, 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3040.158455] EXT4-fs (loop3): Invalid log block size: 3976200192 [ 3040.190894] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3040.251087] EXT4-fs (loop2): inodes count not valid: 32 vs 256 04:07:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) unshare(0x18010100) (async) unshare(0x10000) (async) unshare(0x80) (async) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) unshare(0x0) (async) unshare(0x8000000) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) (async) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (async) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x9, 0x1, 0x4, 0x80, 0x80000000}) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) unshare(0xa000000) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000240)="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") pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) r2 = add_key(&(0x7f0000000000)='logon\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="04df84cf85ff42f07754528b7a67ed6842f8731c87d7138825e72c6575fe98756a952e7ea3f073794b858b0b3fea543c4bd8d14d4f8368af490edced2fd9", 0x3e, 0xfffffffffffffffc) keyctl$search(0xa, r2, &(0x7f00000001c0)='ceph\x00', &(0x7f0000000200)={'syz', 0x3}, 0xfffffffffffffffe) 04:07:31 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x9, 0x81, 0x0, 0xe2, 0x0, 0xf5c8, 0x8000, 0xc, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f00000000c0), 0x9}, 0x40, 0x778, 0x1, 0x4, 0x100, 0xda0, 0x20, 0x0, 0x2e, 0x0, 0x7fffffff}, 0x0, 0x0, r3, 0xa) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) semget$private(0x0, 0x0, 0x0) (async) unshare(0x0) (async) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) (async) unshare(0x80) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (async) unshare(0x2020000) (async) lseek(r2, 0x1, 0x1) (async) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) (async) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x9, 0x81, 0x0, 0xe2, 0x0, 0xf5c8, 0x8000, 0xc, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f00000000c0), 0x9}, 0x40, 0x778, 0x1, 0x4, 0x100, 0xda0, 0x20, 0x0, 0x2e, 0x0, 0x7fffffff}, 0x0, 0x0, r3, 0xa) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) (async) 04:07:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000000100000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000003d0000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000820000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:32 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000000c0)=[0x3ff, 0x7ae, 0x7, 0x7ff, 0x27]) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3040.692815] EXT4-fs (loop3): Invalid log block size: 50331648 [ 3040.726107] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 04:07:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000000200000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000ffffffe2000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3040.855575] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:32 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000000c0)=[0x3ff, 0x7ae, 0x7, 0x7ff, 0x27]) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:32 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x9, 0x81, 0x0, 0xe2, 0x0, 0xf5c8, 0x8000, 0xc, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f00000000c0), 0x9}, 0x40, 0x778, 0x1, 0x4, 0x100, 0xda0, 0x20, 0x0, 0x2e, 0x0, 0x7fffffff}, 0x0, 0x0, r3, 0xa) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) semget$private(0x0, 0x0, 0x0) (async) unshare(0x0) (async) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) (async) unshare(0x80) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (async) unshare(0x2020000) (async) lseek(r2, 0x1, 0x1) (async) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) (async) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x9, 0x81, 0x0, 0xe2, 0x0, 0xf5c8, 0x8000, 0xc, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f00000000c0), 0x9}, 0x40, 0x778, 0x1, 0x4, 0x100, 0xda0, 0x20, 0x0, 0x2e, 0x0, 0x7fffffff}, 0x0, 0x0, r3, 0xa) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) (async) 04:07:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000920000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:32 executing program 1: unshare(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000640)=ANY=[@ANYBLOB="0100000015000000180000005929bf197b6e69eac7072758e4c11933aac8af22b9f2fb5b996bec1030a175990a89c46726cfbc40094b1f00000062530d4b91edac71651ec50063832b8c4e8d5d25f3187bd2ff6a9dbb0f96f2a274cccaaed752e454caf9d2205482f9ffffd9ccd882d888326698f6a18615b9f4513d5ac6c6d846b68912820497c201f3fc3414", @ANYRES32, @ANYBLOB="03000000000000002e2f66696c653000"]) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) unshare(0x20900) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) unshare(0x18010100) (async) unshare(0x10000) unshare(0x80) (async) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) unshare(0x0) unshare(0x8000000) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) (async) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (async) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x9, 0x1, 0x4, 0x80, 0x80000000}) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) (async) unshare(0xa000000) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000240)="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") (async) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) r2 = add_key(&(0x7f0000000000)='logon\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="04df84cf85ff42f07754528b7a67ed6842f8731c87d7138825e72c6575fe98756a952e7ea3f073794b858b0b3fea543c4bd8d14d4f8368af490edced2fd9", 0x3e, 0xfffffffffffffffc) keyctl$search(0xa, r2, &(0x7f00000001c0)='ceph\x00', &(0x7f0000000200)={'syz', 0x3}, 0xfffffffffffffffe) 04:07:32 executing program 5: unshare(0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x90}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3041.207557] EXT4-fs (loop3): Invalid log block size: 4294967040 [ 3041.225699] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 04:07:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000000300000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:33 executing program 1: setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000000c0)={0x1d, @multicast2, 0x4e22, 0x2, 'wlc\x00', 0x20, 0x9, 0x4e}, 0x2c) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x48) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) unshare(0x40060000) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000001e4000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:33 executing program 5: unshare(0x0) (async) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x90}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) (async) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) (async) unshare(0x80) (async) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) (async) lseek(r2, 0x1, 0x1) (async) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000001420000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3041.615613] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:33 executing program 5: unshare(0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x90}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) (async) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) (async) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (async) unshare(0x2020000) (async) lseek(r2, 0x1, 0x1) (async) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000ffffffe4000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3041.714785] EXT4-fs (loop3): Invalid log block size: 16777216 [ 3041.721841] IPVS: ftp: loaded support on port[0] = 21 [ 3041.772477] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 04:07:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000000800000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:33 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) r3 = ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) r4 = ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x10000) unshare(0x80) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000000)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) [ 3042.057455] EXT4-fs (loop3): Invalid log block size: 4294967040 [ 3042.078732] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000003ea000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000002320000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3042.292939] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 04:07:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000000a00000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:34 executing program 1: setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000000c0)={0x1d, @multicast2, 0x4e22, 0x2, 'wlc\x00', 0x20, 0x9, 0x4e}, 0x2c) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x48) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) unshare(0x40060000) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:34 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) (async) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) (async) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) r3 = ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (async) unshare(0x2020000) (async) r4 = ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) lseek(r2, 0x1, 0x1) (async) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000002d20000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3042.452096] EXT4-fs (loop3): Invalid log block size: 50331648 [ 3042.469929] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000001ec000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3042.674816] IPVS: ftp: loaded support on port[0] = 21 [ 3042.730309] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 3042.749034] EXT4-fs (loop3): Invalid log block size: 16777216 04:07:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000fffffff0000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000001300000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:34 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) r3 = ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) r4 = ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) semget$private(0x0, 0x0, 0x0) (async) unshare(0x0) (async) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) (async) unshare(0x80) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (async) unshare(0x2020000) (async) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) (async) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) (async) lseek(r2, 0x1, 0x1) (async) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) (async) 04:07:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000005020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3042.839683] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) unshare(0x18010100) unshare(0x10000) (async, rerun: 32) unshare(0x80) (async, rerun: 32) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000000)) (async) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) (async) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) [ 3042.951527] EXT4-fs (loop3): Invalid log block size: 4294967040 04:07:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000fffffff4000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:34 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x200, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_config_ext={0x4, 0x91}, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3f, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x4, 0xffffffffffffffff, 0x8) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) perf_event_open$cgroup(&(0x7f00000002c0)={0x2, 0x80, 0x9, 0x40, 0x3, 0x3a, 0x0, 0x1000000000000039, 0x10, 0x7, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000200), 0x9}, 0x0, 0x228e, 0x6, 0x7, 0x7, 0x8, 0x2, 0x0, 0x7, 0x0, 0x2c2}, 0xffffffffffffffff, 0xc, r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000240)) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000040)={0x50, 0xfffffffffffffffe, 0x0, {0x7, 0x24, 0x8, 0x2700400, 0x9, 0x8, 0x1000, 0x100}}, 0x50) lseek(r2, 0x0, 0x1) semop(r0, &(0x7f00000001c0)=[{0x3, 0x7f0b, 0x1800}, {0x0, 0xff, 0x1000}, {0x9dd1f887400ba5de, 0xfff8}, {0x2, 0x1, 0x1000}], 0x4) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x80, 0x7, 0x5, 0x400000000000002, 0x1}, &(0x7f0000000100)={0x3, 0x6, 0x4000, 0x3, 0x0, 0x5, 0xe5, 0xbf}, 0x0, &(0x7f00000012c0), &(0x7f00000000c0)={&(0x7f0000001300)={[0xfffffffffffffffe]}, 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3043.190665] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3043.219218] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 04:07:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000001400000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3043.284720] EXT4-fs (loop3): Invalid log block size: 4294967040 04:07:35 executing program 1: setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000000c0)={0x1d, @multicast2, 0x4e22, 0x2, 'wlc\x00', 0x20, 0x9, 0x4e}, 0x2c) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x48) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) unshare(0x40060000) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000005620000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000fffffff5000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:35 executing program 5: unshare(0x0) (async) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x200, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_config_ext={0x4, 0x91}, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3f, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x4, 0xffffffffffffffff, 0x8) (async) r0 = semget$private(0x0, 0x0, 0x0) (async) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) (async) unshare(0x80) (async) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (async) unshare(0x2020000) (async) perf_event_open$cgroup(&(0x7f00000002c0)={0x2, 0x80, 0x9, 0x40, 0x3, 0x3a, 0x0, 0x1000000000000039, 0x10, 0x7, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000200), 0x9}, 0x0, 0x228e, 0x6, 0x7, 0x7, 0x8, 0x2, 0x0, 0x7, 0x0, 0x2c2}, 0xffffffffffffffff, 0xc, r2, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000240)) (async) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000040)={0x50, 0xfffffffffffffffe, 0x0, {0x7, 0x24, 0x8, 0x2700400, 0x9, 0x8, 0x1000, 0x100}}, 0x50) (async) lseek(r2, 0x0, 0x1) semop(r0, &(0x7f00000001c0)=[{0x3, 0x7f0b, 0x1800}, {0x0, 0xff, 0x1000}, {0x9dd1f887400ba5de, 0xfff8}, {0x2, 0x1, 0x1000}], 0x4) (async) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x80, 0x7, 0x5, 0x400000000000002, 0x1}, &(0x7f0000000100)={0x3, 0x6, 0x4000, 0x3, 0x0, 0x5, 0xe5, 0xbf}, 0x0, &(0x7f00000012c0), &(0x7f00000000c0)={&(0x7f0000001300)={[0xfffffffffffffffe]}, 0x8}) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3043.642565] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 04:07:35 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x200, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_config_ext={0x4, 0x91}, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3f, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x4, 0xffffffffffffffff, 0x8) (async) r0 = semget$private(0x0, 0x0, 0x0) (async) unshare(0x0) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) (async) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) unshare(0x0) (async) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (async) unshare(0x2020000) (async) perf_event_open$cgroup(&(0x7f00000002c0)={0x2, 0x80, 0x9, 0x40, 0x3, 0x3a, 0x0, 0x1000000000000039, 0x10, 0x7, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000200), 0x9}, 0x0, 0x228e, 0x6, 0x7, 0x7, 0x8, 0x2, 0x0, 0x7, 0x0, 0x2c2}, 0xffffffffffffffff, 0xc, r2, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000240)) (async) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000040)={0x50, 0xfffffffffffffffe, 0x0, {0x7, 0x24, 0x8, 0x2700400, 0x9, 0x8, 0x1000, 0x100}}, 0x50) lseek(r2, 0x0, 0x1) (async) semop(r0, &(0x7f00000001c0)=[{0x3, 0x7f0b, 0x1800}, {0x0, 0xff, 0x1000}, {0x9dd1f887400ba5de, 0xfff8}, {0x2, 0x1, 0x1000}], 0x4) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x80, 0x7, 0x5, 0x400000000000002, 0x1}, &(0x7f0000000100)={0x3, 0x6, 0x4000, 0x3, 0x0, 0x5, 0xe5, 0xbf}, 0x0, &(0x7f00000012c0), &(0x7f00000000c0)={&(0x7f0000001300)={[0xfffffffffffffffe]}, 0x8}) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000020000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3043.734331] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000005c20000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3043.815470] EXT4-fs (loop3): Invalid log block size: 4294967040 04:07:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) unshare(0x18010100) (async) unshare(0x10000) (async) unshare(0x80) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) pipe(&(0x7f0000000000)) (async) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) (async) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) [ 3043.928980] IPVS: ftp: loaded support on port[0] = 21 04:07:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000fffffff6000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:35 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x80, 0x0, 0x0, 0x1, 0xfffffffffffffffe, 0x0, 0x3f, 0x0, 0xffffffff, 0x0, 0x46}, 0x0, 0xb, 0xffffffffffffffff, 0x1) r0 = semget$private(0x0, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/module/sunrpc', 0x4880, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0xfa, 0x1, 0x1, 0x2, 0x0, 0x80000001, 0x40290, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x100, 0x4, @perf_bp={&(0x7f00000000c0), 0xe}, 0x110, 0xffff, 0x7, 0x6, 0x9b1, 0xfffffffd, 0x800, 0x0, 0xfffff800, 0x0, 0x9}, 0xffffffffffffffff, 0x2, r1, 0x6) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r3 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xb) unshare(0x2020000) lseek(r3, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3044.033475] EXT4-fs (loop2): Invalid log block size: 131072 04:07:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000030000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000006020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3044.153063] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3044.191676] EXT4-fs (loop3): Invalid log block size: 4294967040 [ 3044.313640] EXT4-fs (loop2): Invalid log block size: 196608 [ 3044.377061] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:36 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x1, 0x0, 0x0, 0x10000000000000, 0x0, 0x83f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="38000000060601016c000000000000000000000005000100060000000940020073797a30000000000d0003006c6973743a73657400000000"], 0x38}}, 0x0) unshare(0x10000) unshare(0x80) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0), 0x606584, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r3 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x3) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xb) unshare(0x2020000) lseek(r3, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000000180)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:36 executing program 5: unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x80, 0x0, 0x0, 0x1, 0xfffffffffffffffe, 0x0, 0x3f, 0x0, 0xffffffff, 0x0, 0x46}, 0x0, 0xb, 0xffffffffffffffff, 0x1) r0 = semget$private(0x0, 0x0, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/module/sunrpc', 0x4880, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0xfa, 0x1, 0x1, 0x2, 0x0, 0x80000001, 0x40290, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x100, 0x4, @perf_bp={&(0x7f00000000c0), 0xe}, 0x110, 0xffff, 0x7, 0x6, 0x9b1, 0xfffffffd, 0x800, 0x0, 0xfffff800, 0x0, 0x9}, 0xffffffffffffffff, 0x2, r1, 0x6) (async) unshare(0x0) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) (async) unshare(0x80) (async) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) r3 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xb) (async) unshare(0x2020000) (async) lseek(r3, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000fffffdfc000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000040000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000009c20000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3044.675325] EXT4-fs (loop3): Invalid log block size: 4261412608 04:07:36 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x80, 0x0, 0x0, 0x1, 0xfffffffffffffffe, 0x0, 0x3f, 0x0, 0xffffffff, 0x0, 0x46}, 0x0, 0xb, 0xffffffffffffffff, 0x1) r0 = semget$private(0x0, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/module/sunrpc', 0x4880, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0xfa, 0x1, 0x1, 0x2, 0x0, 0x80000001, 0x40290, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x100, 0x4, @perf_bp={&(0x7f00000000c0), 0xe}, 0x110, 0xffff, 0x7, 0x6, 0x9b1, 0xfffffffd, 0x800, 0x0, 0xfffff800, 0x0, 0x9}, 0xffffffffffffffff, 0x2, r1, 0x6) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r3 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xb) unshare(0x2020000) lseek(r3, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x80, 0x0, 0x0, 0x1, 0xfffffffffffffffe, 0x0, 0x3f, 0x0, 0xffffffff, 0x0, 0x46}, 0x0, 0xb, 0xffffffffffffffff, 0x1) (async) semget$private(0x0, 0x0, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/module/sunrpc', 0x4880, 0x0) (async) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0xfa, 0x1, 0x1, 0x2, 0x0, 0x80000001, 0x40290, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x100, 0x4, @perf_bp={&(0x7f00000000c0), 0xe}, 0x110, 0xffff, 0x7, 0x6, 0x9b1, 0xfffffffd, 0x800, 0x0, 0xfffff800, 0x0, 0x9}, 0xffffffffffffffff, 0x2, r1, 0x6) (async) unshare(0x0) (async) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) (async) unshare(0x80) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) (async) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xb) (async) unshare(0x2020000) (async) lseek(r3, 0x1, 0x1) (async) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) (async) 04:07:36 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) unshare(0x40000000) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3044.719398] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3044.740715] EXT4-fs (loop2): Invalid log block size: 262144 04:07:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x10000) unshare(0x80) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) 04:07:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000fffffdfd000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000050000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3044.826742] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000000000000000200000c020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3045.046949] IPVS: ftp: loaded support on port[0] = 21 04:07:36 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x38020500) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) unshare(0x200) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3045.090605] EXT4-fs (loop3): Invalid log block size: 4261412608 [ 3045.099994] EXT4-fs (loop2): Invalid log block size: 327680 04:07:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000fffffffe000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000060000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3045.241559] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000023000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:36 executing program 5: unshare(0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) (async) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) (async) unshare(0x38020500) (async) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) unshare(0x200) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (async) unshare(0x2020000) (async) lseek(r2, 0x1, 0x1) (async) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3045.420974] EXT4-fs (loop3): Invalid log block size: 4294967040 04:07:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000fff000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3045.541563] EXT4-fs (loop2): Invalid log block size: 393216 04:07:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000070000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3045.655697] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3045.705924] EXT4-fs (loop3): Invalid log block size: 251658240 04:07:37 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) unshare(0x40000000) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3045.799384] EXT4-fs (loop2): Invalid log block size: 458752 04:07:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x10000) (async) unshare(0x80) (async, rerun: 32) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async, rerun: 32) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) (async) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) 04:07:37 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) (async) semop(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) unshare(0x10000) (async) unshare(0x38020500) (async) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) unshare(0x200) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) (async) unshare(0x2020000) lseek(r2, 0x1, 0x1) (async) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000000000000000200000002f000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000001fffff000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000080000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:37 executing program 5: unshare(0x0) unshare(0x20000000) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) semtimedop(r0, &(0x7f00000000c0)=[{0x0, 0x8001, 0x2800}], 0x1, &(0x7f0000000100)={0x0, 0x989680}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) semop(0x0, &(0x7f00000001c0)=[{0x4, 0x0, 0x800}, {0x2, 0x7, 0x1000}, {0x1, 0x7, 0x1000}, {0x4, 0x2, 0x1000}, {0x4, 0x9, 0x800}, {0x3, 0x3, 0x800}, {0x4, 0x9, 0x1800}, {0x1, 0x2, 0x1800}], 0x8) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3046.131724] EXT4-fs (loop3): Invalid log block size: 4280221696 [ 3046.144035] IPVS: ftp: loaded support on port[0] = 21 04:07:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000fcfdffff000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3046.185062] EXT4-fs (loop2): Invalid log block size: 524288 04:07:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000090000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3046.228883] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000000000000000200000003f000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3046.507188] EXT4-fs (loop2): Invalid log block size: 589824 [ 3046.515760] EXT4-fs (loop3): Invalid log block size: 4294835200 04:07:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000fdfdffff000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:38 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x3fa82c8a2e2c33c5, 0x80) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x1010, r3, 0xbd014000) [ 3046.698938] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:38 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) unshare(0x40000000) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) unshare(0x18010100) unshare(0x10000) (async) unshare(0x80) (async) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) (async) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) 04:07:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000100000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000060000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3046.973392] EXT4-fs (loop3): Invalid log block size: 4294835456 04:07:38 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semtimedop(r0, &(0x7f0000000480)=[{0x4, 0x1886, 0x1800}, {0x3, 0x383, 0x800}], 0x2, &(0x7f00000004c0)) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@pppol2tpv3in6, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/247, 0xf7}, {&(0x7f00000000c0)=""/53, 0x35}, {&(0x7f0000000340)=""/127, 0x7f}], 0x3, &(0x7f0000000400)=""/27, 0x1b}, 0x2100) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000007fffffff000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3047.175355] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3047.182572] EXT4-fs (loop2): Invalid log block size: 1048576 [ 3047.194552] IPVS: ftp: loaded support on port[0] = 21 04:07:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000064000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000140000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:39 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = dup(r3) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)=0xd) open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) [ 3047.500528] EXT4-fs (loop2): Invalid log block size: 1310720 04:07:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000180000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3047.545722] EXT4-fs (loop3): Invalid log block size: 4294934272 04:07:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000008cffffff000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:39 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x1, 0x20, 0x9, 0x32, 0x0, 0x1ff, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x5, 0x4}, 0x600, 0x9, 0x4, 0x5, 0xfff, 0xb4e, 0x9, 0x0, 0x7, 0x0, 0x2}, 0x0, 0x9, r0, 0x1) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) unshare(0xc010500) unshare(0x400) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) pselect6(0x40, &(0x7f0000001380)={0x0, 0xffff, 0x3, 0x0, 0x6, 0x200, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300)={[0x5]}, 0x8}) 04:07:39 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000740)={{}, 0x0, 0x0, @inherit={0x58, &(0x7f0000001cc0)=ANY=[@ANYBLOB="010000000000000002000000000000000300000000000000020000000000000004ebffffff000000ffffffffffffffff0900000000000000fbffffffffffffff06000000008b73da3b74f9153e0000000900000000007cf2ff0000008000000000000027734c4f78b6cd1514b4edc500d40e4752145fc25d8a505bd4ece6de52797e941c102c82373bff18975d73b5ed425fc88ad8da311d4bd4"]}, @devid}) ioctl$BTRFS_IOC_BALANCE_V2(r2, 0xc4009420, &(0x7f00000002c0)={0x13, 0x0, {0x10001, @struct={0x5, 0xe6d}, 0x0, 0x1, 0x1, 0x7, 0x9, 0xe26, 0x8, @usage=0x7, 0x20, 0x9, [0xf9a, 0x9, 0x4, 0x6, 0x2, 0x98ba]}, {0x7, @usage, 0x0, 0x4, 0xfffffffffffffff9, 0x3, 0x100000000, 0x1, 0xde, @struct={0xfffffffa, 0xffffffff}, 0x854, 0x80000001, [0x401, 0x6, 0x2, 0x6, 0xfa2, 0x1]}, {0x0, @struct={0x4, 0x7}, 0x0, 0x8000000000000001, 0x0, 0x8, 0x3, 0x0, 0x40, @struct={0x8000, 0x101}, 0x9, 0x5, [0x3, 0x40, 0x9, 0xbc97, 0x4, 0x8c]}, {0x1, 0xd7c, 0x100000001}}) lseek(r2, 0x1, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:39 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) mkdir(&(0x7f00000003c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000480)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}, {@nfs_export_on}]}) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000540)='./bus\x00', &(0x7f0000000580)=@FILEID_BTRFS_WITH_PARENT={0x28}, &(0x7f00000005c0), 0x0) unshare(0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) [ 3048.023934] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3048.061941] EXT4-fs (loop2): Invalid log block size: 1572864 04:07:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000000000000000200000fff9000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3048.225502] EXT4-fs (loop3): Invalid log block size: 4294937600 04:07:39 executing program 1: unshare(0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r3 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x8, 0x0, 0x0, 0x30, 0x0, 0xffffffff, 0x100, 0x9, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x1ff, 0x6}, 0x48, 0x8, 0x5, 0x3, 0xb3, 0x81, 0x9, 0x0, 0xfffffffd, 0x0, 0x70f8}, 0xffffffffffffffff, 0xf, r0, 0x9) r4 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x6, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x3a0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, r3, 0xa) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xb) unshare(0x2020000) lseek(r4, 0x1, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000e2ffffff000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000230000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:40 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r2) sendmsg$NLBL_CIPSOV4_C_LIST(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000640)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r5 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0xb) unshare(0x2020000) lseek(r5, 0x1, 0x1) 04:07:40 executing program 5: unshare(0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x1, 0x7, 0x9, 0x9, 0x0, 0x9, 0x10826, 0x5, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80, 0x2, @perf_config_ext={0x8000000000000000, 0x7}, 0x80, 0x2, 0x52000000, 0x8, 0x0, 0x7, 0xffff, 0x0, 0xb956, 0x0, 0x9}, 0x0, 0x0, r0, 0x1) r3 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x200000000000}, 0x46024, 0x9b, 0x8, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xb) unshare(0x2020000) lseek(r3, 0x1, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:40 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x1, 0x20, 0x9, 0x32, 0x0, 0x1ff, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x5, 0x4}, 0x600, 0x9, 0x4, 0x5, 0xfff, 0xb4e, 0x9, 0x0, 0x7, 0x0, 0x2}, 0x0, 0x9, r0, 0x1) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) unshare(0xc010500) unshare(0x400) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) pselect6(0x40, &(0x7f0000001380)={0x0, 0xffff, 0x3, 0x0, 0x6, 0x200, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300)={[0x5]}, 0x8}) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) unshare(0x18010100) (async) unshare(0x10000) (async) unshare(0x80) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x1, 0x20, 0x9, 0x32, 0x0, 0x1ff, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x5, 0x4}, 0x600, 0x9, 0x4, 0x5, 0xfff, 0xb4e, 0x9, 0x0, 0x7, 0x0, 0x2}, 0x0, 0x9, r0, 0x1) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) unshare(0xc010500) (async) unshare(0x400) (async) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) pselect6(0x40, &(0x7f0000001380)={0x0, 0xffff, 0x3, 0x0, 0x6, 0x200, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300)={[0x5]}, 0x8}) (async) [ 3048.949261] EXT4-fs (loop2): Invalid log block size: 2293760 [ 3048.964176] EXT4-fs (loop3): Invalid log block size: 4294959616 [ 3048.988794] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:40 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x10000) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x7fffffff) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) r2 = ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x5, 0xdf7, 0x80000000, 0xbe19, 0x8, 0xfffffffffffffff8, 0x8, 0xe722}, &(0x7f00000000c0)={0xfffffffffffffff8, 0x401, 0x3ff, 0xfff, 0x10000, 0x7, 0xb1, 0x7}, &(0x7f0000000100)={0x9, 0xe, 0x4b63, 0x4, 0x10001, 0x4, 0x0, 0xfffffffffffffae8}, &(0x7f0000000200)={r3, r4+10000000}, &(0x7f0000000280)={&(0x7f0000000240)={[0x5]}, 0x8}) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) 04:07:40 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x1, 0x20, 0x9, 0x32, 0x0, 0x1ff, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x5, 0x4}, 0x600, 0x9, 0x4, 0x5, 0xfff, 0xb4e, 0x9, 0x0, 0x7, 0x0, 0x2}, 0x0, 0x9, r0, 0x1) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) unshare(0xc010500) unshare(0x400) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) pselect6(0x40, &(0x7f0000001380)={0x0, 0xffff, 0x3, 0x0, 0x6, 0x200, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300)={[0x5]}, 0x8}) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) unshare(0x18010100) (async) unshare(0x10000) (async) unshare(0x80) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x1, 0x20, 0x9, 0x32, 0x0, 0x1ff, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x5, 0x4}, 0x600, 0x9, 0x4, 0x5, 0xfff, 0xb4e, 0x9, 0x0, 0x7, 0x0, 0x2}, 0x0, 0x9, r0, 0x1) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) unshare(0xc010500) (async) unshare(0x400) (async) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) pselect6(0x40, &(0x7f0000001380)={0x0, 0xffff, 0x3, 0x0, 0x6, 0x200, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300)={[0x5]}, 0x8}) (async) 04:07:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000000000000000200000fffa000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000e4ffffff000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x10000) unshare(0x80) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0xee00}}, './file0\x00'}) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x3a, 0x3f, 0x81, 0x0, 0x3, 0x0, 0xf, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000000), 0xe}, 0x50a18, 0xbe, 0x80000000, 0x2, 0x1, 0x9, 0x800, 0x0, 0xff, 0x0, 0x1000}, 0x0, 0xe, r1, 0x0) 04:07:40 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x10010, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x1, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) signalfd(0xffffffffffffffff, &(0x7f0000000340)={[0x8]}, 0x8) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) pselect6(0x40, &(0x7f00000000c0)={0xffffffffffffffff, 0x1000, 0x7fff, 0x3a, 0x1, 0x4, 0x8, 0x8000}, &(0x7f0000000100)={0x8000, 0x8e, 0x4, 0x8a6c, 0x8, 0x4d, 0x100, 0x2}, &(0x7f00000001c0)={0x7, 0x2, 0x1c, 0x7ff, 0x6, 0x1f, 0x2, 0x8000000000000001}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0)={[0x6]}, 0x8}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) dup(r1) 04:07:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000002d0000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000002000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3049.242096] EXT4-fs (loop3): Invalid log block size: 4294960128 04:07:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000f0ffffff000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:41 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x40049409, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3049.561291] EXT4-fs (loop3): Invalid log block size: 4294963200 [ 3049.570656] EXT4-fs (loop2): Invalid log block size: 2949120 [ 3049.606378] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000f4ffffff000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000008000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3049.796029] EXT4-fs (loop3): Invalid log block size: 4294964224 04:07:41 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xff, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x5460, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000560000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:41 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x40049409, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000f5ffffff000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3049.898371] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3049.968972] EXT4-fs (loop3): Invalid log block size: 4294964480 04:07:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) unshare(0x18010100) (async, rerun: 64) unshare(0x10000) (async, rerun: 64) unshare(0x80) (async) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) (async, rerun: 64) unshare(0x0) (async, rerun: 64) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async, rerun: 64) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) (rerun: 64) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0xee00}}, './file0\x00'}) (rerun: 64) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x3a, 0x3f, 0x81, 0x0, 0x3, 0x0, 0xf, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000000), 0xe}, 0x50a18, 0xbe, 0x80000000, 0x2, 0x1, 0x9, 0x800, 0x0, 0xff, 0x0, 0x1000}, 0x0, 0xe, r1, 0x0) 04:07:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000023000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:41 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x10000) unshare(0x80) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) unshare(0x10000000) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) 04:07:41 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x40049409, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000f6ffffff000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000005c0000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3050.076472] EXT4-fs (loop2): Invalid log block size: 5636096 [ 3050.167341] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000000000000000200000002f000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:41 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c72, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x800, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x0, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000600000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3050.362950] EXT4-fs (loop2): Invalid log block size: 6029312 [ 3050.379258] EXT4-fs (loop3): Invalid log block size: 4294964736 04:07:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000feffffff000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3050.497597] EXT4-fs (loop2): Invalid log block size: 6291456 04:07:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000fc0000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:42 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x2000800) unshare(0x10000) unshare(0x80) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) perf_event_open(0x0, 0x0, 0x11, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) pselect6(0x40, &(0x7f0000000000)={0x6, 0x6, 0xac1a, 0x0, 0x1, 0x5, 0x0, 0x9}, &(0x7f00000000c0)={0x3befa192, 0x8, 0x40, 0x80000000, 0x6, 0xfffffffffffffffd, 0x8000000000000000, 0x2}, &(0x7f0000000100)={0x2, 0xffffffffffffffff, 0x400, 0x2, 0x78, 0x3, 0x0, 0x5}, &(0x7f00000001c0)={0x77359400}, &(0x7f0000000240)={&(0x7f0000000200)={[0x6]}, 0x8}) [ 3050.572479] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3050.735311] EXT4-fs (loop3): Invalid log block size: 4294966784 [ 3050.743854] EXT4-fs (loop2): Invalid log block size: 16515072 04:07:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) (async) unshare(0x10000) unshare(0x80) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) (async) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0xee00}}, './file0\x00'}) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x3a, 0x3f, 0x81, 0x0, 0x3, 0x0, 0xf, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000000), 0xe}, 0x50a18, 0xbe, 0x80000000, 0x2, 0x1, 0x9, 0x800, 0x0, 0xff, 0x0, 0x1000}, 0x0, 0xe, r1, 0x0) 04:07:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000064000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:42 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 1) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000ffffffff886000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000003c0100000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000000000020000000f9000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3050.968142] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3051.036127] EXT4-fs (loop3): Invalid log block size: 4294967040 04:07:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000c0ed00002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3051.093580] EXT4-fs (loop2): Invalid log block size: 20709376 04:07:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000740100000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:42 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3051.187120] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000000000020000000fa000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3051.316110] EXT4-fs (loop3): Invalid log cluster size: 15581184 04:07:43 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 1) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:43 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x2, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3051.450661] EXT4-fs (loop2): Invalid log block size: 24379392 [ 3051.589711] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3051.595208] FAULT_INJECTION: forcing a failure. [ 3051.595208] name failslab, interval 1, probability 0, space 0, times 0 [ 3051.613041] CPU: 1 PID: 15811 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3051.620935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3051.630274] Call Trace: [ 3051.632865] dump_stack+0x1fc/0x2ef [ 3051.636489] should_fail.cold+0xa/0xf [ 3051.640282] ? setup_fault_attr+0x200/0x200 [ 3051.644594] __should_failslab+0x115/0x180 [ 3051.648810] should_failslab+0x5/0x10 [ 3051.652603] kmem_cache_alloc_trace+0x284/0x380 [ 3051.657264] ? loop_queue_work+0x20c0/0x20c0 [ 3051.661653] loop_add+0x4e/0x8a0 [ 3051.665002] loop_control_ioctl+0x16c/0x480 [ 3051.669303] ? loop_lookup+0x1d0/0x1d0 [ 3051.673192] ? loop_lookup+0x1d0/0x1d0 [ 3051.677071] do_vfs_ioctl+0xcdb/0x12e0 [ 3051.680941] ? lock_downgrade+0x720/0x720 [ 3051.685069] ? check_preemption_disabled+0x41/0x280 [ 3051.690064] ? ioctl_preallocate+0x200/0x200 [ 3051.694469] ? __fget+0x356/0x510 [ 3051.697915] ? do_dup2+0x450/0x450 [ 3051.701436] ? ksys_write+0x241/0x2a0 [ 3051.705216] ? fput+0x2b/0x190 [ 3051.708392] ksys_ioctl+0x9b/0xc0 [ 3051.711837] __x64_sys_ioctl+0x6f/0xb0 [ 3051.715714] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3051.720274] do_syscall_64+0xf9/0x620 [ 3051.724067] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3051.729235] RIP: 0033:0x7f47f0c06109 [ 3051.732937] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3051.751836] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3051.759533] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3051.766783] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3051.774049] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3051.781328] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3051.788577] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 04:07:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x10000) unshare(0x80) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) 04:07:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000001002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:43 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c02, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000007c0100000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000000200020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:43 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 2) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3051.935871] EXT4-fs (loop3): Invalid log cluster size: 16777216 [ 3051.957305] FAULT_INJECTION: forcing a failure. [ 3051.957305] name failslab, interval 1, probability 0, space 0, times 0 [ 3051.957493] EXT4-fs (loop2): Invalid log block size: 24903680 [ 3051.971397] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3051.984472] CPU: 1 PID: 15838 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3051.992368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3052.001720] Call Trace: [ 3052.004319] dump_stack+0x1fc/0x2ef [ 3052.007949] should_fail.cold+0xa/0xf [ 3052.011737] ? setup_fault_attr+0x200/0x200 [ 3052.016042] ? lock_acquire+0x170/0x3c0 [ 3052.020002] __should_failslab+0x115/0x180 [ 3052.024224] should_failslab+0x5/0x10 [ 3052.028006] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 3052.033096] __kmalloc_node+0x38/0x70 [ 3052.036884] blk_mq_alloc_tag_set+0x330/0xa30 [ 3052.041369] loop_add+0x26d/0x8a0 [ 3052.044809] loop_control_ioctl+0x16c/0x480 [ 3052.049112] ? loop_lookup+0x1d0/0x1d0 [ 3052.052984] ? mark_held_locks+0xa6/0xf0 [ 3052.057034] ? ksys_write+0x241/0x2a0 [ 3052.060835] ? loop_lookup+0x1d0/0x1d0 [ 3052.064710] do_vfs_ioctl+0xcdb/0x12e0 [ 3052.068585] ? lock_downgrade+0x720/0x720 [ 3052.072715] ? check_preemption_disabled+0x41/0x280 [ 3052.077710] ? ioctl_preallocate+0x200/0x200 [ 3052.082104] ? __fget+0x356/0x510 [ 3052.085552] ? do_dup2+0x450/0x450 [ 3052.089087] ? rcu_nmi_exit+0xb3/0x180 [ 3052.092962] ksys_ioctl+0x9b/0xc0 [ 3052.096400] __x64_sys_ioctl+0x6f/0xb0 [ 3052.100283] do_syscall_64+0xf9/0x620 [ 3052.104078] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3052.109252] RIP: 0033:0x7f47f0c06109 [ 3052.112950] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 04:07:43 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c03, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3052.131832] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3052.139608] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3052.146863] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3052.154116] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3052.161368] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3052.168619] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 04:07:43 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 3) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000e40100000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000000000020000000f9ff0020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3052.314934] FAULT_INJECTION: forcing a failure. [ 3052.314934] name failslab, interval 1, probability 0, space 0, times 0 [ 3052.327564] CPU: 1 PID: 15852 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3052.335462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3052.344811] Call Trace: [ 3052.347400] dump_stack+0x1fc/0x2ef [ 3052.351024] should_fail.cold+0xa/0xf [ 3052.354814] ? setup_fault_attr+0x200/0x200 [ 3052.359125] ? lock_acquire+0x1ec/0x3c0 [ 3052.363095] __should_failslab+0x115/0x180 [ 3052.367331] should_failslab+0x5/0x10 [ 3052.371123] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 3052.376218] __kmalloc_node+0x38/0x70 [ 3052.380011] blk_mq_alloc_tag_set+0x3c2/0xa30 [ 3052.384500] loop_add+0x26d/0x8a0 [ 3052.387943] loop_control_ioctl+0x16c/0x480 [ 3052.392251] ? loop_lookup+0x1d0/0x1d0 [ 3052.396130] ? lock_release+0x429/0x8b0 [ 3052.400097] ? loop_lookup+0x1d0/0x1d0 [ 3052.403972] do_vfs_ioctl+0xcdb/0x12e0 [ 3052.407850] ? lock_downgrade+0x720/0x720 [ 3052.412000] ? check_preemption_disabled+0x41/0x280 [ 3052.417021] ? ioctl_preallocate+0x200/0x200 [ 3052.421423] ? __fget+0x356/0x510 [ 3052.424871] ? do_dup2+0x450/0x450 [ 3052.428405] ? ksys_write+0x24b/0x2a0 [ 3052.432197] ? fput+0x2b/0x190 [ 3052.435386] ksys_ioctl+0x9b/0xc0 [ 3052.438830] __x64_sys_ioctl+0x6f/0xb0 [ 3052.442703] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3052.447272] do_syscall_64+0xf9/0x620 [ 3052.451062] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3052.456236] RIP: 0033:0x7f47f0c06109 [ 3052.459937] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3052.478841] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3052.486540] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3052.493799] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3052.501059] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3052.508319] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 04:07:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000002002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3052.515574] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 04:07:44 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c04, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3052.627153] EXT4-fs (loop2): Invalid log block size: 31719424 04:07:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x10000) unshare(0x80) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) unshare(0x18010100) (async) unshare(0x10000) (async) unshare(0x80) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) (async) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) 04:07:44 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 4) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000ec0100000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000004002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3052.722119] EXT4-fs (loop3): Invalid log cluster size: 33554432 [ 3052.729499] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:44 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c05, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000000000020000000faff0020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3052.812671] FAULT_INJECTION: forcing a failure. [ 3052.812671] name failslab, interval 1, probability 0, space 0, times 0 [ 3052.840001] CPU: 0 PID: 15881 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3052.847898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3052.857238] Call Trace: [ 3052.859824] dump_stack+0x1fc/0x2ef [ 3052.863442] should_fail.cold+0xa/0xf [ 3052.867228] ? setup_fault_attr+0x200/0x200 [ 3052.871554] ? lock_acquire+0x170/0x3c0 [ 3052.875523] __should_failslab+0x115/0x180 [ 3052.879743] should_failslab+0x5/0x10 [ 3052.883527] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 3052.888617] blk_mq_init_tags+0x6a/0x2b0 [ 3052.892674] blk_mq_alloc_rq_map+0x9d/0x230 [ 3052.897090] __blk_mq_alloc_rq_map+0xa3/0x3b0 [ 3052.901573] blk_mq_alloc_tag_set+0x589/0xa30 [ 3052.906068] loop_add+0x26d/0x8a0 [ 3052.909509] loop_control_ioctl+0x16c/0x480 [ 3052.913817] ? loop_lookup+0x1d0/0x1d0 [ 3052.917718] ? ksys_write+0x241/0x2a0 [ 3052.921513] ? loop_lookup+0x1d0/0x1d0 [ 3052.925395] do_vfs_ioctl+0xcdb/0x12e0 [ 3052.929287] ? lock_downgrade+0x720/0x720 [ 3052.933430] ? check_preemption_disabled+0x41/0x280 [ 3052.938432] ? ioctl_preallocate+0x200/0x200 [ 3052.942845] ? __fget+0x356/0x510 [ 3052.946283] ? do_dup2+0x450/0x450 [ 3052.949816] ? rcu_nmi_exit+0xb3/0x180 [ 3052.953703] ksys_ioctl+0x9b/0xc0 [ 3052.957153] __x64_sys_ioctl+0x6f/0xb0 [ 3052.961023] do_syscall_64+0xf9/0x620 [ 3052.964808] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3052.969978] RIP: 0033:0x7f47f0c06109 [ 3052.973676] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3052.992561] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3053.000344] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 04:07:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x10000) unshare(0x80) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) unshare(0x18010100) (async) unshare(0x10000) (async) unshare(0x80) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) (async) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) [ 3053.007603] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3053.014857] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3053.022118] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3053.029438] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 [ 3053.044836] blk-mq: reduced tag depth (128 -> 64) 04:07:44 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c06, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x10000) unshare(0x80) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x332, 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) 04:07:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000fa0200000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:44 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 5) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3053.206781] EXT4-fs (loop3): Invalid log cluster size: 67108864 [ 3053.219295] EXT4-fs (loop2): Invalid log block size: 32243712 04:07:44 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c07, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000018002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3053.348117] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020020020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3053.396175] EXT4-fs (loop2): Invalid log block size: 49938432 [ 3053.406244] EXT4-fs (loop3): Invalid log cluster size: 402653184 04:07:45 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c08, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000300000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3053.482923] FAULT_INJECTION: forcing a failure. [ 3053.482923] name failslab, interval 1, probability 0, space 0, times 0 [ 3053.497633] CPU: 0 PID: 15946 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3053.505511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3053.514966] Call Trace: [ 3053.517546] dump_stack+0x1fc/0x2ef [ 3053.521161] should_fail.cold+0xa/0xf [ 3053.524954] ? setup_fault_attr+0x200/0x200 [ 3053.529275] ? lock_acquire+0x170/0x3c0 [ 3053.533254] __should_failslab+0x115/0x180 [ 3053.537475] should_failslab+0x5/0x10 [ 3053.541265] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 3053.546352] __kmalloc_node+0x38/0x70 [ 3053.550143] sbitmap_init_node+0x123/0x440 [ 3053.554371] sbitmap_queue_init_node+0x37/0x6c0 [ 3053.559029] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 3053.564126] blk_mq_init_tags+0x10d/0x2b0 [ 3053.568261] blk_mq_alloc_rq_map+0x9d/0x230 [ 3053.572690] __blk_mq_alloc_rq_map+0xa3/0x3b0 [ 3053.577180] blk_mq_alloc_tag_set+0x589/0xa30 [ 3053.581664] loop_add+0x26d/0x8a0 [ 3053.585121] loop_control_ioctl+0x16c/0x480 [ 3053.589436] ? loop_lookup+0x1d0/0x1d0 [ 3053.593316] ? ksys_write+0x241/0x2a0 [ 3053.597112] ? loop_lookup+0x1d0/0x1d0 [ 3053.600994] do_vfs_ioctl+0xcdb/0x12e0 [ 3053.604864] ? lock_downgrade+0x720/0x720 [ 3053.608998] ? check_preemption_disabled+0x41/0x280 [ 3053.614005] ? ioctl_preallocate+0x200/0x200 [ 3053.618401] ? __fget+0x356/0x510 [ 3053.621839] ? do_dup2+0x450/0x450 [ 3053.625370] ? rcu_nmi_exit+0xb3/0x180 [ 3053.629254] ksys_ioctl+0x9b/0xc0 [ 3053.632692] __x64_sys_ioctl+0x6f/0xb0 [ 3053.636578] do_syscall_64+0xf9/0x620 [ 3053.640371] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3053.645544] RIP: 0033:0x7f47f0c06109 [ 3053.649250] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3053.668137] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3053.675920] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3053.683174] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3053.690429] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3053.697692] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3053.704946] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 [ 3053.730694] blk-mq: reduced tag depth (128 -> 64) 04:07:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000000fc002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:45 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c09, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:45 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 6) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3053.883940] EXT4-fs (loop2): Invalid log block size: 50331648 04:07:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000400300000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3053.955756] EXT4-fs (loop3): Invalid log cluster size: 4227858432 [ 3054.023404] EXT4-fs (loop2): Invalid log block size: 54525952 [ 3054.033706] FAULT_INJECTION: forcing a failure. [ 3054.033706] name failslab, interval 1, probability 0, space 0, times 0 [ 3054.054617] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3054.065560] CPU: 0 PID: 15983 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3054.073448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3054.082803] Call Trace: [ 3054.085392] dump_stack+0x1fc/0x2ef [ 3054.089009] should_fail.cold+0xa/0xf [ 3054.092803] ? setup_fault_attr+0x200/0x200 [ 3054.097135] __should_failslab+0x115/0x180 [ 3054.101363] should_failslab+0x5/0x10 [ 3054.105150] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 3054.110249] sbitmap_queue_init_node+0x240/0x6c0 [ 3054.115002] blk_mq_init_tags+0x10d/0x2b0 [ 3054.119147] blk_mq_alloc_rq_map+0x9d/0x230 [ 3054.123458] __blk_mq_alloc_rq_map+0xa3/0x3b0 [ 3054.127952] blk_mq_alloc_tag_set+0x589/0xa30 [ 3054.132442] loop_add+0x26d/0x8a0 [ 3054.135888] loop_control_ioctl+0x16c/0x480 [ 3054.140197] ? loop_lookup+0x1d0/0x1d0 [ 3054.144073] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3054.148641] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3054.153385] ? loop_lookup+0x1d0/0x1d0 [ 3054.157263] do_vfs_ioctl+0xcdb/0x12e0 [ 3054.161140] ? lock_downgrade+0x720/0x720 [ 3054.165277] ? ioctl_preallocate+0x200/0x200 [ 3054.169676] ? __fget+0x356/0x510 [ 3054.173117] ? do_dup2+0x450/0x450 [ 3054.176644] ? vfs_write+0x393/0x540 [ 3054.180348] ? fput+0x2b/0x190 [ 3054.183532] ksys_ioctl+0x9b/0xc0 [ 3054.186977] __x64_sys_ioctl+0x6f/0xb0 [ 3054.190853] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3054.195423] do_syscall_64+0xf9/0x620 [ 3054.199217] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3054.204394] RIP: 0033:0x7f47f0c06109 [ 3054.208100] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3054.226985] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3054.234679] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3054.241939] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3054.249194] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3054.256452] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3054.263706] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 04:07:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x10000) unshare(0x80) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x332, 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) unshare(0x18010100) (async) unshare(0x10000) (async) unshare(0x80) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async) syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00') (async) preadv(r1, &(0x7f00000017c0), 0x332, 0x0, 0x0) (async) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) (async) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) 04:07:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000012000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:45 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c0a, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3054.295740] blk-mq: reduced tag depth (128 -> 64) 04:07:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020030020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x10000) unshare(0x80) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x332, 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) unshare(0x18010100) (async) unshare(0x10000) (async) unshare(0x80) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async) syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00') (async) preadv(r1, &(0x7f00000017c0), 0x332, 0x0, 0x0) (async) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) (async) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) 04:07:46 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 7) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:46 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c0b, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000022000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3054.483923] EXT4-fs (loop3): #blocks per group too big: 8193 04:07:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000500300000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x8000000000, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xd, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x10000) unshare(0x80) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) unshare(0x2000000) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x332, 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) [ 3054.593759] EXT4-fs (loop3): #blocks per group too big: 8194 [ 3054.611769] FAULT_INJECTION: forcing a failure. [ 3054.611769] name failslab, interval 1, probability 0, space 0, times 0 [ 3054.614039] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:46 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c0c, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3054.652608] CPU: 1 PID: 16048 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3054.660515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3054.669862] Call Trace: [ 3054.672450] dump_stack+0x1fc/0x2ef [ 3054.676089] should_fail.cold+0xa/0xf [ 3054.679900] ? setup_fault_attr+0x200/0x200 [ 3054.684232] ? lock_acquire+0x170/0x3c0 [ 3054.688211] __should_failslab+0x115/0x180 [ 3054.692444] should_failslab+0x5/0x10 [ 3054.696233] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 3054.701324] sbitmap_queue_init_node+0x240/0x6c0 [ 3054.706070] blk_mq_init_tags+0x16f/0x2b0 [ 3054.710217] blk_mq_alloc_rq_map+0x9d/0x230 [ 3054.714534] __blk_mq_alloc_rq_map+0xa3/0x3b0 [ 3054.719015] blk_mq_alloc_tag_set+0x589/0xa30 [ 3054.723501] loop_add+0x26d/0x8a0 [ 3054.726948] loop_control_ioctl+0x16c/0x480 [ 3054.731260] ? loop_lookup+0x1d0/0x1d0 [ 3054.735145] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3054.739713] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3054.744454] ? loop_lookup+0x1d0/0x1d0 [ 3054.748324] do_vfs_ioctl+0xcdb/0x12e0 [ 3054.752196] ? lock_downgrade+0x720/0x720 [ 3054.756334] ? ioctl_preallocate+0x200/0x200 [ 3054.760753] ? __fget+0x356/0x510 [ 3054.764204] ? do_dup2+0x450/0x450 [ 3054.767725] ? vfs_write+0x393/0x540 [ 3054.771420] ? fput+0x2b/0x190 [ 3054.774604] ksys_ioctl+0x9b/0xc0 [ 3054.778051] __x64_sys_ioctl+0x6f/0xb0 [ 3054.781921] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3054.786481] do_syscall_64+0xf9/0x620 [ 3054.790278] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3054.795463] RIP: 0033:0x7f47f0c06109 [ 3054.799169] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3054.818054] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3054.825751] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3054.833003] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3054.840263] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3054.847524] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3054.854785] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 [ 3054.893342] blk-mq: reduced tag depth (128 -> 64) 04:07:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020040020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:46 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c0d, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:46 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 8) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000032000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3055.029940] EXT4-fs (loop2): Invalid log block size: 55574528 04:07:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000a40300000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3055.128806] EXT4-fs (loop3): #blocks per group too big: 8195 [ 3055.177467] FAULT_INJECTION: forcing a failure. [ 3055.177467] name failslab, interval 1, probability 0, space 0, times 0 [ 3055.189978] CPU: 0 PID: 16087 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3055.197871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3055.207218] Call Trace: [ 3055.209795] dump_stack+0x1fc/0x2ef [ 3055.213408] should_fail.cold+0xa/0xf [ 3055.217190] ? setup_fault_attr+0x200/0x200 [ 3055.221492] ? __lockdep_init_map+0x100/0x5a0 [ 3055.225972] __should_failslab+0x115/0x180 [ 3055.230193] should_failslab+0x5/0x10 [ 3055.233979] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 3055.239067] __kmalloc_node+0x38/0x70 [ 3055.242855] blk_mq_alloc_rq_map+0xdf/0x230 [ 3055.247170] __blk_mq_alloc_rq_map+0xa3/0x3b0 [ 3055.251646] blk_mq_alloc_tag_set+0x589/0xa30 [ 3055.256127] loop_add+0x26d/0x8a0 [ 3055.259567] loop_control_ioctl+0x16c/0x480 [ 3055.263870] ? loop_lookup+0x1d0/0x1d0 [ 3055.267737] ? mark_held_locks+0xa6/0xf0 [ 3055.271781] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3055.276520] ? ksys_write+0x241/0x2a0 [ 3055.280317] ? loop_lookup+0x1d0/0x1d0 [ 3055.284193] do_vfs_ioctl+0xcdb/0x12e0 [ 3055.288078] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3055.292651] ? ioctl_preallocate+0x200/0x200 [ 3055.297050] ? rcu_nmi_exit+0xb3/0x180 [ 3055.300926] ? retint_kernel+0x2d/0x2d [ 3055.304807] ? security_file_ioctl+0x22/0xb0 [ 3055.309214] ? __sanitizer_cov_trace_pc+0x44/0x50 [ 3055.314043] ksys_ioctl+0x9b/0xc0 [ 3055.317480] __x64_sys_ioctl+0x6f/0xb0 [ 3055.321369] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3055.325946] do_syscall_64+0xf9/0x620 [ 3055.329735] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3055.334906] RIP: 0033:0x7f47f0c06109 [ 3055.338650] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3055.357533] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3055.365231] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 04:07:46 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c0e, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3055.372491] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3055.379752] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3055.387004] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3055.394253] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 [ 3055.423288] blk-mq: reduced tag depth (128 -> 64) 04:07:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x8000000000, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xd, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x10000) unshare(0x80) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) unshare(0x2000000) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x332, 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x8000000000, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xd, 0xffffffffffffffff, 0x0) (async) unshare(0x18010100) (async) unshare(0x10000) (async) unshare(0x80) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async) unshare(0x2000000) (async) syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00') (async) preadv(r1, &(0x7f00000017c0), 0x332, 0x0, 0x0) (async) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) (async) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) (async) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) [ 3055.507627] EXT4-fs (loop2): Invalid log block size: 61079552 04:07:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000042000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000d00300000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:47 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c0f, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:47 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 9) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3055.626514] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020050020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3055.705317] FAULT_INJECTION: forcing a failure. [ 3055.705317] name failslab, interval 1, probability 0, space 0, times 0 [ 3055.721902] CPU: 1 PID: 16125 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3055.729822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3055.739162] Call Trace: [ 3055.741751] dump_stack+0x1fc/0x2ef [ 3055.745377] should_fail.cold+0xa/0xf [ 3055.749163] ? setup_fault_attr+0x200/0x200 [ 3055.753472] ? __lockdep_init_map+0x100/0x5a0 [ 3055.757954] __should_failslab+0x115/0x180 [ 3055.762185] should_failslab+0x5/0x10 [ 3055.765976] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 3055.771081] __kmalloc_node+0x38/0x70 [ 3055.774881] blk_mq_alloc_rq_map+0x120/0x230 [ 3055.779287] __blk_mq_alloc_rq_map+0xa3/0x3b0 [ 3055.783789] blk_mq_alloc_tag_set+0x589/0xa30 [ 3055.788296] loop_add+0x26d/0x8a0 [ 3055.791760] loop_control_ioctl+0x16c/0x480 [ 3055.796079] ? loop_lookup+0x1d0/0x1d0 [ 3055.799967] ? loop_lookup+0x1d0/0x1d0 [ 3055.803847] do_vfs_ioctl+0xcdb/0x12e0 [ 3055.807720] ? lock_downgrade+0x720/0x720 [ 3055.811861] ? check_preemption_disabled+0x41/0x280 [ 3055.816883] ? ioctl_preallocate+0x200/0x200 [ 3055.821298] ? __fget+0x356/0x510 [ 3055.824747] ? do_dup2+0x450/0x450 [ 3055.828270] ? fput+0x2b/0x190 [ 3055.831462] ksys_ioctl+0x9b/0xc0 [ 3055.834908] __x64_sys_ioctl+0x6f/0xb0 [ 3055.838789] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3055.843366] do_syscall_64+0xf9/0x620 [ 3055.847152] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3055.852333] RIP: 0033:0x7f47f0c06109 [ 3055.856045] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3055.874935] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3055.882640] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3055.889905] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3055.897172] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 04:07:47 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c10, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3055.904429] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3055.911685] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 [ 3055.933126] blk-mq: reduced tag depth (128 -> 64) 04:07:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000ea0300000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:47 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 10) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000052000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3056.085428] EXT4-fs (loop2): Invalid log block size: 63963136 [ 3056.103951] EXT4-fs (loop3): #blocks per group too big: 8196 04:07:47 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c11, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3056.202828] FAULT_INJECTION: forcing a failure. [ 3056.202828] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3056.215518] CPU: 0 PID: 16151 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3056.223413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3056.232757] Call Trace: [ 3056.235333] dump_stack+0x1fc/0x2ef [ 3056.238959] should_fail.cold+0xa/0xf [ 3056.242845] ? setup_fault_attr+0x200/0x200 [ 3056.247158] __alloc_pages_nodemask+0x239/0x2890 [ 3056.251908] ? kasan_kmalloc+0x139/0x160 [ 3056.255964] ? __kmalloc_node+0x4c/0x70 [ 3056.259933] ? blk_mq_alloc_rq_map+0x120/0x230 [ 3056.264509] ? __blk_mq_alloc_rq_map+0xa3/0x3b0 [ 3056.269168] ? blk_mq_alloc_tag_set+0x589/0xa30 [ 3056.273926] ? loop_add+0x26d/0x8a0 [ 3056.277557] ? loop_control_ioctl+0x16c/0x480 [ 3056.282135] ? do_vfs_ioctl+0xcdb/0x12e0 [ 3056.286186] ? do_syscall_64+0xf9/0x620 [ 3056.290148] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3056.295520] ? mark_held_locks+0xa6/0xf0 [ 3056.299589] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3056.304451] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3056.309035] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3056.313788] ? retint_kernel+0x2d/0x2d [ 3056.317680] ? blk_mq_alloc_rqs+0x5f/0x800 [ 3056.321919] ? blk_mq_alloc_rqs+0x6e/0x800 [ 3056.326141] blk_mq_alloc_rqs+0x242/0x800 [ 3056.330284] ? blk_mq_alloc_rq_map+0xaa/0x230 [ 3056.334770] __blk_mq_alloc_rq_map+0x15b/0x3b0 [ 3056.339343] blk_mq_alloc_tag_set+0x589/0xa30 [ 3056.343852] loop_add+0x26d/0x8a0 [ 3056.347307] loop_control_ioctl+0x16c/0x480 [ 3056.351624] ? loop_lookup+0x1d0/0x1d0 [ 3056.355506] ? loop_lookup+0x1d0/0x1d0 [ 3056.359379] ? loop_lookup+0x1d0/0x1d0 [ 3056.363252] do_vfs_ioctl+0xcdb/0x12e0 [ 3056.367126] ? lock_downgrade+0x720/0x720 [ 3056.371260] ? check_preemption_disabled+0x41/0x280 [ 3056.376262] ? ioctl_preallocate+0x200/0x200 [ 3056.380664] ? __fget+0x356/0x510 [ 3056.384101] ? do_dup2+0x450/0x450 [ 3056.387624] ? rcu_nmi_exit+0xb3/0x180 [ 3056.391514] ksys_ioctl+0x9b/0xc0 [ 3056.394957] __x64_sys_ioctl+0x6f/0xb0 [ 3056.398857] do_syscall_64+0xf9/0x620 [ 3056.402660] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3056.407841] RIP: 0033:0x7f47f0c06109 [ 3056.411547] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3056.430435] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3056.438134] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3056.445388] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 04:07:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x8000000000, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xd, 0xffffffffffffffff, 0x0) unshare(0x18010100) (async) unshare(0x10000) (async) unshare(0x80) (async) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async) unshare(0x2000000) (async) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x332, 0x0, 0x0) (async) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) (async) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) [ 3056.452650] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3056.459913] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3056.467181] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 04:07:48 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c12, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:48 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 11) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000100400000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3056.637445] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3056.641114] EXT4-fs (loop2): Invalid log block size: 65667072 [ 3056.674790] EXT4-fs (loop3): #blocks per group too big: 8197 04:07:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020060020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3056.753750] FAULT_INJECTION: forcing a failure. [ 3056.753750] name failslab, interval 1, probability 0, space 0, times 0 [ 3056.766405] CPU: 1 PID: 16183 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3056.774303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3056.783657] Call Trace: [ 3056.786251] dump_stack+0x1fc/0x2ef [ 3056.789893] should_fail.cold+0xa/0xf [ 3056.793700] ? setup_fault_attr+0x200/0x200 [ 3056.798014] ? lock_acquire+0x170/0x3c0 [ 3056.801994] __should_failslab+0x115/0x180 [ 3056.806230] should_failslab+0x5/0x10 [ 3056.810037] kmem_cache_alloc_node+0x245/0x3b0 [ 3056.814619] blk_alloc_queue_node+0x32/0xbf0 [ 3056.819016] blk_mq_init_queue+0x44/0xa0 [ 3056.823075] loop_add+0x2cb/0x8a0 [ 3056.826540] loop_control_ioctl+0x16c/0x480 [ 3056.830870] ? loop_lookup+0x1d0/0x1d0 [ 3056.834771] ? loop_lookup+0x1d0/0x1d0 [ 3056.838642] do_vfs_ioctl+0xcdb/0x12e0 [ 3056.842525] ? lock_downgrade+0x720/0x720 [ 3056.846665] ? check_preemption_disabled+0x41/0x280 [ 3056.851666] ? ioctl_preallocate+0x200/0x200 [ 3056.856060] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3056.860634] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3056.865408] ? rcu_nmi_exit+0xb3/0x180 [ 3056.869293] ? retint_kernel+0x2d/0x2d [ 3056.873170] ksys_ioctl+0x9b/0xc0 [ 3056.876622] __x64_sys_ioctl+0x6f/0xb0 [ 3056.880505] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3056.885084] do_syscall_64+0xf9/0x620 [ 3056.888873] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3056.894046] RIP: 0033:0x7f47f0c06109 [ 3056.897741] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3056.916664] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3056.924365] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3056.931637] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3056.938891] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3056.946143] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3056.953399] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 04:07:48 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 12) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:48 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c13, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000062000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000500000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3057.070899] EXT4-fs (loop2): Invalid log block size: 68157440 [ 3057.102939] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020070020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:48 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c14, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3057.157952] EXT4-fs (loop3): #blocks per group too big: 8198 [ 3057.233315] FAULT_INJECTION: forcing a failure. [ 3057.233315] name failslab, interval 1, probability 0, space 0, times 0 [ 3057.246157] CPU: 0 PID: 16208 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3057.254038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3057.263376] Call Trace: [ 3057.265964] dump_stack+0x1fc/0x2ef [ 3057.269582] should_fail.cold+0xa/0xf [ 3057.273375] ? setup_fault_attr+0x200/0x200 [ 3057.277693] ? lock_acquire+0x170/0x3c0 [ 3057.281662] __should_failslab+0x115/0x180 [ 3057.285896] should_failslab+0x5/0x10 [ 3057.289696] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 3057.294787] __kmalloc_node+0x38/0x70 [ 3057.298573] ? mempool_free+0x370/0x370 [ 3057.302534] mempool_init_node+0x137/0x6c0 [ 3057.306765] ? mempool_alloc+0x350/0x350 [ 3057.310824] ? mempool_free+0x370/0x370 [ 3057.314779] mempool_init+0x38/0x50 [ 3057.318407] bioset_init+0x327/0x810 [ 3057.322118] ? kmem_cache_alloc_node+0x351/0x3b0 [ 3057.326863] blk_alloc_queue_node+0x189/0xbf0 04:07:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x2000000) unshare(0x10000) unshare(0x80) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) [ 3057.331347] blk_mq_init_queue+0x44/0xa0 [ 3057.335404] loop_add+0x2cb/0x8a0 [ 3057.338863] loop_control_ioctl+0x16c/0x480 [ 3057.343173] ? loop_lookup+0x1d0/0x1d0 [ 3057.347048] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3057.351625] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3057.356393] ? loop_lookup+0x1d0/0x1d0 [ 3057.360270] do_vfs_ioctl+0xcdb/0x12e0 [ 3057.364178] ? lock_downgrade+0x720/0x720 [ 3057.368334] ? check_preemption_disabled+0x41/0x280 [ 3057.373358] ? ioctl_preallocate+0x200/0x200 [ 3057.377778] ? __fget+0x356/0x510 [ 3057.381243] ? do_dup2+0x450/0x450 [ 3057.384795] ? fput+0x2b/0x190 [ 3057.387997] ksys_ioctl+0x9b/0xc0 [ 3057.391438] __x64_sys_ioctl+0x6f/0xb0 [ 3057.395307] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3057.399874] do_syscall_64+0xf9/0x620 [ 3057.403670] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3057.408848] RIP: 0033:0x7f47f0c06109 [ 3057.412554] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3057.431443] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3057.439136] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3057.446389] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3057.453661] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3057.460913] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3057.468184] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 04:07:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000072000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:49 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c15, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3057.510264] EXT4-fs (loop2): Invalid log block size: 83886080 04:07:49 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 13) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000600000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3057.636537] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3057.647671] EXT4-fs (loop3): #blocks per group too big: 8199 04:07:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020080020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:49 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c16, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000082000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3057.744623] FAULT_INJECTION: forcing a failure. [ 3057.744623] name failslab, interval 1, probability 0, space 0, times 0 [ 3057.757484] CPU: 0 PID: 16248 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3057.765397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3057.774741] Call Trace: [ 3057.777327] dump_stack+0x1fc/0x2ef [ 3057.780962] should_fail.cold+0xa/0xf [ 3057.784762] ? setup_fault_attr+0x200/0x200 [ 3057.789078] ? lock_acquire+0x170/0x3c0 [ 3057.793034] ? mempool_free+0x370/0x370 [ 3057.797001] ? mempool_free+0x370/0x370 [ 3057.800973] __should_failslab+0x115/0x180 [ 3057.805195] should_failslab+0x5/0x10 [ 3057.808982] kmem_cache_alloc+0x277/0x370 [ 3057.813113] ? mempool_alloc+0x350/0x350 [ 3057.817167] ? mempool_free+0x370/0x370 [ 3057.821144] mempool_init_node+0x2d0/0x6c0 [ 3057.825386] ? mempool_alloc+0x350/0x350 [ 3057.829445] ? mempool_free+0x370/0x370 [ 3057.833422] mempool_init+0x38/0x50 [ 3057.837042] bioset_init+0x327/0x810 [ 3057.840762] ? kmem_cache_alloc_node+0x351/0x3b0 [ 3057.845514] blk_alloc_queue_node+0x189/0xbf0 [ 3057.850011] blk_mq_init_queue+0x44/0xa0 [ 3057.854058] loop_add+0x2cb/0x8a0 [ 3057.857508] loop_control_ioctl+0x16c/0x480 [ 3057.861823] ? loop_lookup+0x1d0/0x1d0 [ 3057.865707] ? loop_lookup+0x1d0/0x1d0 [ 3057.869589] do_vfs_ioctl+0xcdb/0x12e0 [ 3057.873474] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3057.878225] ? ioctl_preallocate+0x200/0x200 [ 3057.882622] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3057.887376] ? rcu_nmi_exit+0xb3/0x180 [ 3057.891263] ? retint_kernel+0x2d/0x2d [ 3057.895145] ? __fdget+0x1d0/0x230 [ 3057.898670] ? __sanitizer_cov_trace_pc+0x44/0x50 [ 3057.903512] ksys_ioctl+0x9b/0xc0 [ 3057.906972] __x64_sys_ioctl+0x6f/0xb0 [ 3057.910849] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3057.915414] do_syscall_64+0xf9/0x620 [ 3057.919212] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3057.924393] RIP: 0033:0x7f47f0c06109 [ 3057.928098] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3057.946987] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3057.954677] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3057.961927] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3057.969179] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3057.976429] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3057.983682] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 04:07:49 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 14) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:49 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c17, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3058.001926] EXT4-fs (loop2): Invalid log block size: 100663296 04:07:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000700000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3058.068597] EXT4-fs (loop3): #blocks per group too big: 8200 04:07:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000092000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3058.133364] FAULT_INJECTION: forcing a failure. [ 3058.133364] name failslab, interval 1, probability 0, space 0, times 0 [ 3058.155892] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3058.159159] CPU: 1 PID: 16277 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3058.171926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3058.181269] Call Trace: [ 3058.183865] dump_stack+0x1fc/0x2ef [ 3058.187490] should_fail.cold+0xa/0xf [ 3058.191276] ? setup_fault_attr+0x200/0x200 [ 3058.195578] ? lock_acquire+0x170/0x3c0 [ 3058.199995] __should_failslab+0x115/0x180 [ 3058.204235] should_failslab+0x5/0x10 [ 3058.208027] kmem_cache_alloc+0x277/0x370 [ 3058.212157] ? mempool_alloc+0x350/0x350 [ 3058.216201] mempool_init_node+0x2d0/0x6c0 [ 3058.220436] ? mempool_alloc+0x350/0x350 [ 3058.224494] ? mempool_free+0x370/0x370 [ 3058.228461] mempool_init+0x38/0x50 [ 3058.232072] bioset_init+0x327/0x810 [ 3058.235791] ? kmem_cache_alloc_node+0x351/0x3b0 [ 3058.240548] blk_alloc_queue_node+0x189/0xbf0 [ 3058.245040] blk_mq_init_queue+0x44/0xa0 [ 3058.249105] loop_add+0x2cb/0x8a0 [ 3058.252544] loop_control_ioctl+0x16c/0x480 [ 3058.256848] ? loop_lookup+0x1d0/0x1d0 [ 3058.260731] ? ksys_write+0x241/0x2a0 [ 3058.264531] ? loop_lookup+0x1d0/0x1d0 [ 3058.268410] do_vfs_ioctl+0xcdb/0x12e0 [ 3058.272283] ? lock_downgrade+0x720/0x720 [ 3058.276422] ? check_preemption_disabled+0x41/0x280 [ 3058.281433] ? ioctl_preallocate+0x200/0x200 [ 3058.285932] ? __fget+0x356/0x510 [ 3058.289380] ? do_dup2+0x450/0x450 [ 3058.292903] ? ksys_write+0x239/0x2a0 [ 3058.296684] ? fput+0x2b/0x190 [ 3058.299981] ksys_ioctl+0x9b/0xc0 [ 3058.303445] __x64_sys_ioctl+0x6f/0xb0 [ 3058.307327] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3058.311895] do_syscall_64+0xf9/0x620 [ 3058.315686] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3058.320872] RIP: 0033:0x7f47f0c06109 [ 3058.324589] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3058.343488] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3058.351193] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3058.358448] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3058.365711] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3058.372972] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 04:07:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x2000000) (async) unshare(0x10000) (async) unshare(0x80) (async) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) [ 3058.380238] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 04:07:50 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 15) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020090020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3058.447245] EXT4-fs (loop2): Invalid log block size: 117440512 04:07:50 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c18, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3058.552547] FAULT_INJECTION: forcing a failure. [ 3058.552547] name failslab, interval 1, probability 0, space 0, times 0 [ 3058.564848] CPU: 0 PID: 16299 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3058.572732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3058.582078] Call Trace: [ 3058.584712] dump_stack+0x1fc/0x2ef [ 3058.588323] should_fail.cold+0xa/0xf [ 3058.592107] ? setup_fault_attr+0x200/0x200 [ 3058.596410] ? lock_acquire+0x170/0x3c0 [ 3058.600369] __should_failslab+0x115/0x180 [ 3058.604587] should_failslab+0x5/0x10 [ 3058.608370] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 3058.613453] __kmalloc_node+0x38/0x70 [ 3058.617235] ? mempool_free+0x370/0x370 [ 3058.621189] mempool_init_node+0x137/0x6c0 [ 3058.625405] ? mempool_alloc+0x350/0x350 [ 3058.629446] ? mempool_free+0x370/0x370 [ 3058.633399] mempool_init+0x38/0x50 [ 3058.637097] bioset_init+0x532/0x810 [ 3058.640814] blk_alloc_queue_node+0x189/0xbf0 [ 3058.645292] blk_mq_init_queue+0x44/0xa0 [ 3058.649349] loop_add+0x2cb/0x8a0 [ 3058.652791] loop_control_ioctl+0x16c/0x480 [ 3058.657094] ? loop_lookup+0x1d0/0x1d0 [ 3058.660963] ? lock_release+0x429/0x8b0 [ 3058.664918] ? loop_lookup+0x1d0/0x1d0 [ 3058.668786] do_vfs_ioctl+0xcdb/0x12e0 [ 3058.672657] ? lock_downgrade+0x720/0x720 [ 3058.676789] ? check_preemption_disabled+0x41/0x280 [ 3058.681963] ? ioctl_preallocate+0x200/0x200 [ 3058.686354] ? __fget+0x356/0x510 [ 3058.689790] ? do_dup2+0x450/0x450 [ 3058.693312] ? ksys_write+0x205/0x2a0 [ 3058.697091] ? fput+0x2b/0x190 [ 3058.700268] ksys_ioctl+0x9b/0xc0 [ 3058.703701] __x64_sys_ioctl+0x6f/0xb0 [ 3058.707569] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3058.712131] do_syscall_64+0xf9/0x620 [ 3058.715915] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3058.721083] RIP: 0033:0x7f47f0c06109 [ 3058.724779] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3058.743657] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3058.751344] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3058.758592] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3058.765840] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3058.773089] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3058.780337] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 04:07:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000900000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3058.803739] EXT4-fs (loop3): #blocks per group too big: 8201 04:07:50 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 16) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3058.901922] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3058.913683] FAULT_INJECTION: forcing a failure. [ 3058.913683] name failslab, interval 1, probability 0, space 0, times 0 [ 3058.926568] CPU: 1 PID: 16319 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3058.934468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3058.943817] Call Trace: [ 3058.946390] dump_stack+0x1fc/0x2ef [ 3058.950016] should_fail.cold+0xa/0xf [ 3058.953832] ? setup_fault_attr+0x200/0x200 [ 3058.958158] ? lock_acquire+0x170/0x3c0 [ 3058.962127] ? mempool_free+0x370/0x370 [ 3058.966084] ? mempool_free+0x370/0x370 [ 3058.970055] __should_failslab+0x115/0x180 [ 3058.974298] should_failslab+0x5/0x10 [ 3058.978091] kmem_cache_alloc+0x277/0x370 [ 3058.982220] ? mempool_alloc+0x350/0x350 [ 3058.986263] ? mempool_free+0x370/0x370 [ 3058.990228] mempool_init_node+0x2d0/0x6c0 [ 3058.994455] ? mempool_alloc+0x350/0x350 [ 3058.998496] ? mempool_free+0x370/0x370 [ 3059.002449] mempool_init+0x38/0x50 [ 3059.006062] bioset_init+0x532/0x810 [ 3059.009769] ? kmem_cache_alloc_node+0x351/0x3b0 [ 3059.014519] blk_alloc_queue_node+0x189/0xbf0 [ 3059.019001] blk_mq_init_queue+0x44/0xa0 [ 3059.023045] loop_add+0x2cb/0x8a0 [ 3059.026484] loop_control_ioctl+0x16c/0x480 [ 3059.030798] ? loop_lookup+0x1d0/0x1d0 [ 3059.034698] ? ksys_write+0x241/0x2a0 [ 3059.038490] ? loop_lookup+0x1d0/0x1d0 [ 3059.042360] do_vfs_ioctl+0xcdb/0x12e0 [ 3059.046231] ? lock_downgrade+0x720/0x720 [ 3059.050377] ? check_preemption_disabled+0x41/0x280 [ 3059.055383] ? ioctl_preallocate+0x200/0x200 [ 3059.059780] ? __fget+0x356/0x510 [ 3059.063216] ? do_dup2+0x450/0x450 [ 3059.066742] ? rcu_nmi_exit+0xb3/0x180 [ 3059.070632] ksys_ioctl+0x9b/0xc0 [ 3059.074098] __x64_sys_ioctl+0x6f/0xb0 [ 3059.077990] do_syscall_64+0xf9/0x620 [ 3059.081788] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3059.086956] RIP: 0033:0x7f47f0c06109 [ 3059.090660] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3059.109560] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3059.117263] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3059.124513] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3059.131775] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3059.139035] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 04:07:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000000000a2000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:50 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c19, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3059.146283] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 04:07:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020140020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3059.211434] EXT4-fs (loop2): Invalid log block size: 150994944 04:07:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000041000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) unshare(0x18010100) (async) unshare(0x2000000) (async) unshare(0x10000) (async) unshare(0x80) (async) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) (async) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) 04:07:50 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 17) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3059.281415] EXT4-fs (loop3): #blocks per group too big: 8202 04:07:50 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c1a, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3059.412511] FAULT_INJECTION: forcing a failure. [ 3059.412511] name failslab, interval 1, probability 0, space 0, times 0 [ 3059.424661] CPU: 0 PID: 16344 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3059.432545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3059.442009] Call Trace: [ 3059.444591] dump_stack+0x1fc/0x2ef [ 3059.448204] should_fail.cold+0xa/0xf [ 3059.451993] ? setup_fault_attr+0x200/0x200 [ 3059.456302] ? lock_acquire+0x170/0x3c0 [ 3059.460264] __should_failslab+0x115/0x180 [ 3059.464494] should_failslab+0x5/0x10 [ 3059.468294] kmem_cache_alloc+0x277/0x370 [ 3059.472439] ? mempool_alloc+0x350/0x350 [ 3059.476485] mempool_init_node+0x2d0/0x6c0 [ 3059.480715] ? mempool_alloc+0x350/0x350 [ 3059.484766] ? mempool_free+0x370/0x370 [ 3059.488724] mempool_init+0x38/0x50 [ 3059.492336] bioset_init+0x532/0x810 [ 3059.496035] ? kmem_cache_alloc_node+0x351/0x3b0 [ 3059.500798] blk_alloc_queue_node+0x189/0xbf0 [ 3059.505286] blk_mq_init_queue+0x44/0xa0 [ 3059.509342] loop_add+0x2cb/0x8a0 [ 3059.512781] loop_control_ioctl+0x16c/0x480 [ 3059.517097] ? loop_lookup+0x1d0/0x1d0 [ 3059.520997] ? ksys_write+0x241/0x2a0 [ 3059.524799] ? loop_lookup+0x1d0/0x1d0 [ 3059.528688] do_vfs_ioctl+0xcdb/0x12e0 [ 3059.532593] ? lock_downgrade+0x720/0x720 [ 3059.536748] ? check_preemption_disabled+0x41/0x280 [ 3059.541772] ? ioctl_preallocate+0x200/0x200 [ 3059.546168] ? __fget+0x356/0x510 [ 3059.549614] ? do_dup2+0x450/0x450 [ 3059.553139] ? retint_kernel+0x2d/0x2d [ 3059.557016] ksys_ioctl+0x9b/0xc0 [ 3059.560458] __x64_sys_ioctl+0x6f/0xb0 [ 3059.564340] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3059.568917] do_syscall_64+0xf9/0x620 [ 3059.572717] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3059.577891] RIP: 0033:0x7f47f0c06109 [ 3059.581587] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3059.600481] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 04:07:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000102000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:51 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 18) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3059.608175] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3059.615429] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3059.622683] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3059.629948] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3059.637210] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 04:07:51 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c1b, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000001400000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3059.717443] EXT4-fs (loop2): Invalid log block size: 268697600 [ 3059.772355] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3059.812671] FAULT_INJECTION: forcing a failure. [ 3059.812671] name failslab, interval 1, probability 0, space 0, times 0 [ 3059.824433] CPU: 0 PID: 16368 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3059.832314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3059.841665] Call Trace: [ 3059.844243] dump_stack+0x1fc/0x2ef [ 3059.847874] should_fail.cold+0xa/0xf [ 3059.851673] ? setup_fault_attr+0x200/0x200 [ 3059.855984] ? lock_acquire+0x170/0x3c0 [ 3059.859962] __should_failslab+0x115/0x180 [ 3059.864191] should_failslab+0x5/0x10 [ 3059.867979] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 3059.873069] bdi_alloc_node+0x5c/0xd0 [ 3059.876853] blk_alloc_queue_node+0x1af/0xbf0 [ 3059.881355] blk_mq_init_queue+0x44/0xa0 [ 3059.885406] loop_add+0x2cb/0x8a0 [ 3059.888850] loop_control_ioctl+0x16c/0x480 [ 3059.893168] ? loop_lookup+0x1d0/0x1d0 [ 3059.897040] ? loop_lookup+0x1d0/0x1d0 [ 3059.900914] ? loop_lookup+0x1d0/0x1d0 [ 3059.904790] do_vfs_ioctl+0xcdb/0x12e0 [ 3059.908661] ? lock_downgrade+0x720/0x720 [ 3059.912791] ? check_preemption_disabled+0x41/0x280 [ 3059.917823] ? ioctl_preallocate+0x200/0x200 [ 3059.922245] ? __fget+0x356/0x510 [ 3059.925689] ? do_dup2+0x450/0x450 [ 3059.929210] ? vfs_write+0x393/0x540 [ 3059.932908] ? fput+0x2b/0x190 [ 3059.936088] ksys_ioctl+0x9b/0xc0 [ 3059.939532] __x64_sys_ioctl+0x6f/0xb0 [ 3059.943415] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3059.947980] do_syscall_64+0xf9/0x620 [ 3059.951772] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3059.956949] RIP: 0033:0x7f47f0c06109 [ 3059.960656] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3059.979558] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3059.987260] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3059.994534] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3060.001788] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 04:07:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020230020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:51 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c1c, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3060.009044] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3060.016310] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 [ 3060.038061] EXT4-fs (loop2): Invalid log block size: 335544320 [ 3060.053984] EXT4-fs (loop3): #blocks per group too big: 8208 04:07:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000001800000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000004102000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000000000020000000202d0020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:51 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 19) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:51 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c1d, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x10000) unshare(0x80) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340), 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) clock_gettime(0x1, &(0x7f0000000000)) 04:07:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000142000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3060.299080] EXT4-fs (loop3): Invalid log cluster size: 67108864 [ 3060.326143] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3060.341073] EXT4-fs (loop2): Invalid log block size: 402653184 [ 3060.393324] FAULT_INJECTION: forcing a failure. [ 3060.393324] name failslab, interval 1, probability 0, space 0, times 0 [ 3060.405056] CPU: 1 PID: 16402 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3060.412950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3060.422299] Call Trace: [ 3060.424874] dump_stack+0x1fc/0x2ef [ 3060.428484] should_fail.cold+0xa/0xf [ 3060.432268] ? setup_fault_attr+0x200/0x200 [ 3060.436572] ? lock_acquire+0x170/0x3c0 [ 3060.440530] __should_failslab+0x115/0x180 [ 3060.444760] should_failslab+0x5/0x10 [ 3060.448546] kmem_cache_alloc_trace+0x284/0x380 [ 3060.453199] wb_congested_get_create+0x180/0x3a0 [ 3060.457942] wb_init+0x4a7/0x770 [ 3060.461306] ? __raw_spin_lock_init+0x28/0x100 [ 3060.465874] bdi_init+0x29c/0x410 [ 3060.469324] bdi_alloc_node+0x76/0xd0 [ 3060.473123] blk_alloc_queue_node+0x1af/0xbf0 [ 3060.477619] blk_mq_init_queue+0x44/0xa0 [ 3060.481670] loop_add+0x2cb/0x8a0 [ 3060.485109] loop_control_ioctl+0x16c/0x480 [ 3060.489412] ? loop_lookup+0x1d0/0x1d0 [ 3060.493285] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3060.498038] ? rcu_nmi_exit+0xb3/0x180 [ 3060.501916] ? loop_lookup+0x1d0/0x1d0 [ 3060.505901] do_vfs_ioctl+0xcdb/0x12e0 [ 3060.509777] ? lock_downgrade+0x720/0x720 [ 3060.513911] ? ioctl_preallocate+0x200/0x200 [ 3060.518305] ? __fget+0x356/0x510 [ 3060.521747] ? do_dup2+0x450/0x450 [ 3060.525276] ksys_ioctl+0x9b/0xc0 [ 3060.528718] __x64_sys_ioctl+0x6f/0xb0 [ 3060.532731] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3060.537297] do_syscall_64+0xf9/0x620 [ 3060.541097] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3060.546267] RIP: 0033:0x7f47f0c06109 [ 3060.549979] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3060.568860] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3060.576556] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3060.583807] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 04:07:52 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c1e, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3060.591056] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3060.598306] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3060.605560] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 04:07:52 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 20) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020500020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000002000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3060.734312] EXT4-fs (loop3): #blocks per group too big: 8212 04:07:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000202000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:52 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c21, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3060.835821] FAULT_INJECTION: forcing a failure. [ 3060.835821] name failslab, interval 1, probability 0, space 0, times 0 [ 3060.847918] CPU: 0 PID: 16429 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3060.855804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3060.865141] Call Trace: [ 3060.867719] dump_stack+0x1fc/0x2ef [ 3060.871329] should_fail.cold+0xa/0xf [ 3060.875122] ? setup_fault_attr+0x200/0x200 [ 3060.879432] __should_failslab+0x115/0x180 [ 3060.883658] should_failslab+0x5/0x10 [ 3060.887441] kmem_cache_alloc_trace+0x284/0x380 [ 3060.892091] blk_alloc_queue_stats+0x3c/0x100 [ 3060.896587] blk_alloc_queue_node+0x1eb/0xbf0 [ 3060.901079] blk_mq_init_queue+0x44/0xa0 [ 3060.905136] loop_add+0x2cb/0x8a0 [ 3060.908577] loop_control_ioctl+0x16c/0x480 [ 3060.912881] ? loop_lookup+0x1d0/0x1d0 [ 3060.916752] ? ksys_write+0x241/0x2a0 [ 3060.920535] ? loop_lookup+0x1d0/0x1d0 [ 3060.924414] do_vfs_ioctl+0xcdb/0x12e0 [ 3060.928308] ? lock_downgrade+0x720/0x720 [ 3060.932446] ? check_preemption_disabled+0x41/0x280 [ 3060.937446] ? ioctl_preallocate+0x200/0x200 [ 3060.941840] ? __fget+0x356/0x510 [ 3060.945278] ? do_dup2+0x450/0x450 [ 3060.948798] ? fput+0x2b/0x190 [ 3060.951975] ksys_ioctl+0x9b/0xc0 [ 3060.955411] __x64_sys_ioctl+0x6f/0xb0 [ 3060.959280] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3060.963847] do_syscall_64+0xf9/0x620 [ 3060.967633] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3060.972803] RIP: 0033:0x7f47f0c06109 [ 3060.976501] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3060.995388] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3061.003085] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3061.010346] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3061.017598] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3061.024849] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3061.032099] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 [ 3061.061233] EXT4-fs (loop2): Invalid log block size: 536870912 04:07:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x10000) unshare(0x80) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340), 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) clock_gettime(0x1, &(0x7f0000000000)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) unshare(0x18010100) (async) unshare(0x10000) (async) unshare(0x80) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340), 0x40000, 0x0) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) (async) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) (async) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) (async) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) (async) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) clock_gettime(0x1, &(0x7f0000000000)) (async) 04:07:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020560020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000002300000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:52 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 21) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3061.105671] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3061.135936] EXT4-fs (loop3): #blocks per group too big: 8224 04:07:52 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c22, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000232000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000002d00000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3061.261745] EXT4-fs (loop2): Invalid log block size: 587202560 [ 3061.287476] FAULT_INJECTION: forcing a failure. [ 3061.287476] name failslab, interval 1, probability 0, space 0, times 0 [ 3061.302431] CPU: 1 PID: 16464 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3061.310333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3061.319688] Call Trace: [ 3061.322287] dump_stack+0x1fc/0x2ef [ 3061.325936] should_fail.cold+0xa/0xf [ 3061.329748] ? setup_fault_attr+0x200/0x200 [ 3061.334064] ? lock_acquire+0x170/0x3c0 [ 3061.338021] __should_failslab+0x115/0x180 [ 3061.342241] should_failslab+0x5/0x10 [ 3061.346023] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 3061.351121] blkg_alloc+0x92/0x630 [ 3061.354657] blkcg_init_queue+0x24/0x540 [ 3061.358700] blk_alloc_queue_node+0x7d0/0xbf0 [ 3061.363179] blk_mq_init_queue+0x44/0xa0 [ 3061.367222] loop_add+0x2cb/0x8a0 [ 3061.370671] loop_control_ioctl+0x16c/0x480 [ 3061.374984] ? loop_lookup+0x1d0/0x1d0 [ 3061.378851] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3061.383588] ? ksys_write+0x241/0x2a0 [ 3061.387369] ? loop_lookup+0x1d0/0x1d0 [ 3061.391255] do_vfs_ioctl+0xcdb/0x12e0 [ 3061.395134] ? lock_downgrade+0x720/0x720 [ 3061.399263] ? check_preemption_disabled+0x41/0x280 [ 3061.404259] ? ioctl_preallocate+0x200/0x200 [ 3061.408647] ? __fget+0x356/0x510 [ 3061.412095] ? do_dup2+0x450/0x450 [ 3061.415628] ? vfs_write+0x393/0x540 [ 3061.419323] ? fput+0x2b/0x190 [ 3061.422499] ksys_ioctl+0x9b/0xc0 [ 3061.425937] __x64_sys_ioctl+0x6f/0xb0 [ 3061.429818] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3061.434396] do_syscall_64+0xf9/0x620 [ 3061.438181] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3061.443348] RIP: 0033:0x7f47f0c06109 04:07:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) unshare(0x18010100) (async) unshare(0x10000) (async) unshare(0x80) (async) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340), 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) (async) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) (async) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) (async) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) clock_gettime(0x1, &(0x7f0000000000)) [ 3061.447046] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3061.465931] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3061.473630] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3061.480889] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3061.488140] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3061.495395] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3061.502650] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 04:07:53 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c23, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:53 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 22) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3061.562778] EXT4-fs (loop3): #blocks per group too big: 8227 [ 3061.593648] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000000002d2000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000000000020000000205c0020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:53 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c24, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3061.679854] EXT4-fs (loop2): Invalid log block size: 754974720 [ 3061.755407] FAULT_INJECTION: forcing a failure. [ 3061.755407] name failslab, interval 1, probability 0, space 0, times 0 [ 3061.768939] CPU: 1 PID: 16513 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3061.776827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3061.786237] Call Trace: [ 3061.788815] dump_stack+0x1fc/0x2ef [ 3061.792433] should_fail.cold+0xa/0xf [ 3061.796231] ? setup_fault_attr+0x200/0x200 [ 3061.800553] ? lock_acquire+0x170/0x3c0 [ 3061.804525] __should_failslab+0x115/0x180 [ 3061.808750] should_failslab+0x5/0x10 [ 3061.812546] kmem_cache_alloc_trace+0x284/0x380 [ 3061.817205] blk_iolatency_init+0x47/0x2d0 [ 3061.821439] blkcg_init_queue+0x1c1/0x540 [ 3061.825595] blk_alloc_queue_node+0x7d0/0xbf0 [ 3061.830081] blk_mq_init_queue+0x44/0xa0 [ 3061.834128] loop_add+0x2cb/0x8a0 [ 3061.837583] loop_control_ioctl+0x16c/0x480 [ 3061.841908] ? loop_lookup+0x1d0/0x1d0 [ 3061.845792] ? loop_control_ioctl+0x1a/0x480 [ 3061.850272] ? loop_lookup+0x1d0/0x1d0 [ 3061.854156] do_vfs_ioctl+0xcdb/0x12e0 [ 3061.858049] ? lock_downgrade+0x720/0x720 [ 3061.862195] ? check_preemption_disabled+0x41/0x280 [ 3061.867197] ? ioctl_preallocate+0x200/0x200 [ 3061.871593] ? __fget+0x356/0x510 [ 3061.875030] ? do_dup2+0x450/0x450 [ 3061.878559] ? vfs_write+0x393/0x540 [ 3061.882279] ? fput+0x2b/0x190 [ 3061.885463] ksys_ioctl+0x9b/0xc0 [ 3061.888899] __x64_sys_ioctl+0x6f/0xb0 [ 3061.892780] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3061.897363] do_syscall_64+0xf9/0x620 [ 3061.901171] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3061.906362] RIP: 0033:0x7f47f0c06109 [ 3061.910076] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3061.928968] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3061.936668] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3061.943923] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3061.951184] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3061.958446] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3061.965708] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 04:07:53 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c25, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000013c00000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000000013c2000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3062.013078] EXT4-fs (loop3): #blocks per group too big: 8237 04:07:53 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 23) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020600020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3062.084696] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3062.140177] EXT4-fs (loop3): Invalid log cluster size: 16777216 04:07:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000000003f2000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3062.235220] EXT4-fs (loop2): Invalid log block size: 1006698496 [ 3062.238523] FAULT_INJECTION: forcing a failure. [ 3062.238523] name failslab, interval 1, probability 0, space 0, times 0 [ 3062.277858] CPU: 1 PID: 16551 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3062.285749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3062.295087] Call Trace: [ 3062.297667] dump_stack+0x1fc/0x2ef [ 3062.301281] should_fail.cold+0xa/0xf [ 3062.305068] ? setup_fault_attr+0x200/0x200 [ 3062.309494] ? lock_acquire+0x170/0x3c0 [ 3062.313457] __should_failslab+0x115/0x180 [ 3062.317688] should_failslab+0x5/0x10 [ 3062.321484] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 3062.326586] ? iolatency_pd_init+0x6f0/0x6f0 [ 3062.331011] iolatency_pd_alloc+0x6e/0x120 [ 3062.335258] blkcg_activate_policy+0x120/0x5d0 [ 3062.339837] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 3062.344840] blk_iolatency_init+0x123/0x2d0 [ 3062.349148] blkcg_init_queue+0x1c1/0x540 [ 3062.353308] blk_alloc_queue_node+0x7d0/0xbf0 [ 3062.357818] blk_mq_init_queue+0x44/0xa0 [ 3062.361868] loop_add+0x2cb/0x8a0 [ 3062.365313] loop_control_ioctl+0x16c/0x480 [ 3062.369647] ? loop_lookup+0x1d0/0x1d0 [ 3062.373535] ? rcu_nmi_exit+0xb3/0x180 [ 3062.377411] ? retint_kernel+0x2d/0x2d [ 3062.381290] ? loop_lookup+0x1d0/0x1d0 [ 3062.385166] do_vfs_ioctl+0xcdb/0x12e0 [ 3062.389050] ? lock_downgrade+0x720/0x720 [ 3062.393194] ? check_preemption_disabled+0x41/0x280 [ 3062.398200] ? ioctl_preallocate+0x200/0x200 [ 3062.402615] ? __fget+0x356/0x510 [ 3062.406053] ? do_dup2+0x450/0x450 [ 3062.409580] ? vfs_write+0x393/0x540 [ 3062.413293] ? fput+0x2b/0x190 [ 3062.416485] ksys_ioctl+0x9b/0xc0 [ 3062.419936] __x64_sys_ioctl+0x6f/0xb0 [ 3062.423814] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3062.428476] do_syscall_64+0xf9/0x620 [ 3062.432279] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3062.437459] RIP: 0033:0x7f47f0c06109 [ 3062.441166] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3062.460059] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3062.467770] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 04:07:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x10000) unshare(0x80) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) unshare(0x40000) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) unshare(0x80) r1 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) unshare(0x8040600) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) [ 3062.475029] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3062.482291] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3062.489553] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3062.496818] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 04:07:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000003f00000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:54 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c26, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:54 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 24) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3062.586627] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000000000020000000209c0020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3062.695023] EXT4-fs (loop3): #blocks per group too big: 8255 [ 3062.779776] FAULT_INJECTION: forcing a failure. [ 3062.779776] name failslab, interval 1, probability 0, space 0, times 0 [ 3062.789813] EXT4-fs (loop2): Invalid log block size: 1056964608 [ 3062.791439] CPU: 0 PID: 16577 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3062.791456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3062.791461] Call Trace: [ 3062.791483] dump_stack+0x1fc/0x2ef [ 3062.791503] should_fail.cold+0xa/0xf [ 3062.824747] ? setup_fault_attr+0x200/0x200 [ 3062.829077] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 3062.834079] __should_failslab+0x115/0x180 [ 3062.838301] should_failslab+0x5/0x10 [ 3062.842087] kmem_cache_alloc_node_trace+0x57/0x3b0 [ 3062.847102] iolatency_pd_alloc+0x6e/0x120 [ 3062.851345] ? iolatency_pd_init+0x6f0/0x6f0 [ 3062.855746] blkcg_activate_policy+0x249/0x5d0 [ 3062.860317] blk_iolatency_init+0x123/0x2d0 [ 3062.864625] blkcg_init_queue+0x1c1/0x540 [ 3062.868780] blk_alloc_queue_node+0x7d0/0xbf0 [ 3062.873275] blk_mq_init_queue+0x44/0xa0 [ 3062.877321] loop_add+0x2cb/0x8a0 [ 3062.880759] loop_control_ioctl+0x16c/0x480 [ 3062.885067] ? loop_lookup+0x1d0/0x1d0 [ 3062.888942] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3062.893507] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3062.898246] ? loop_lookup+0x1d0/0x1d0 [ 3062.902117] do_vfs_ioctl+0xcdb/0x12e0 [ 3062.906000] ? lock_downgrade+0x720/0x720 [ 3062.910154] ? ioctl_preallocate+0x200/0x200 [ 3062.914568] ? __fget+0x356/0x510 [ 3062.918028] ? do_dup2+0x450/0x450 [ 3062.921560] ? vfs_write+0x393/0x540 [ 3062.925254] ? fput+0x2b/0x190 [ 3062.928431] ksys_ioctl+0x9b/0xc0 [ 3062.931868] __x64_sys_ioctl+0x6f/0xb0 [ 3062.935750] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3062.940329] do_syscall_64+0xf9/0x620 [ 3062.944118] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3062.949559] RIP: 0033:0x7f47f0c06109 [ 3062.953277] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3062.972160] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 04:07:54 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c27, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3062.979852] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3062.987114] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3062.994374] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3063.001632] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3063.008888] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 04:07:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000402000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:54 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 25) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000004000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020c00020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3063.249465] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3063.275957] FAULT_INJECTION: forcing a failure. [ 3063.275957] name failslab, interval 1, probability 0, space 0, times 0 [ 3063.298744] CPU: 1 PID: 16603 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3063.306654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3063.316094] Call Trace: [ 3063.318695] dump_stack+0x1fc/0x2ef [ 3063.322311] should_fail.cold+0xa/0xf [ 3063.326121] ? setup_fault_attr+0x200/0x200 [ 3063.330437] ? lock_acquire+0x170/0x3c0 [ 3063.334409] __should_failslab+0x115/0x180 [ 3063.338631] should_failslab+0x5/0x10 [ 3063.342414] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 3063.347501] blk_throtl_init+0x7c/0x620 [ 3063.351467] ? blk_iolatency_init+0x1b7/0x2d0 [ 3063.355973] blkcg_init_queue+0x1e3/0x540 [ 3063.360132] blk_alloc_queue_node+0x7d0/0xbf0 [ 3063.364629] blk_mq_init_queue+0x44/0xa0 [ 3063.368732] loop_add+0x2cb/0x8a0 [ 3063.372183] loop_control_ioctl+0x16c/0x480 [ 3063.376496] ? loop_lookup+0x1d0/0x1d0 [ 3063.380383] ? do_vfs_ioctl+0xbd/0x12e0 [ 3063.384351] ? loop_lookup+0x1d0/0x1d0 [ 3063.388225] do_vfs_ioctl+0xcdb/0x12e0 [ 3063.392112] ? lock_downgrade+0x720/0x720 [ 3063.396258] ? check_preemption_disabled+0x41/0x280 [ 3063.401261] ? ioctl_preallocate+0x200/0x200 [ 3063.405652] ? __fget+0x356/0x510 [ 3063.409098] ? do_dup2+0x450/0x450 [ 3063.412636] ? fput+0x2b/0x190 [ 3063.415814] ksys_ioctl+0x9b/0xc0 [ 3063.419270] __x64_sys_ioctl+0x6f/0xb0 [ 3063.423153] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3063.427719] do_syscall_64+0xf9/0x620 [ 3063.431517] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3063.436700] RIP: 0033:0x7f47f0c06109 [ 3063.440415] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3063.459321] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3063.467032] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3063.474304] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3063.481665] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3063.488935] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 04:07:55 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c28, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3063.496205] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 04:07:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) unshare(0x18010100) (async) unshare(0x10000) (async) unshare(0x80) (async) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) (async) unshare(0x40000) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) unshare(0x80) r1 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) (async) unshare(0x8040600) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 04:07:55 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 26) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3063.600364] EXT4-fs (loop2): Invalid log block size: 1073741824 [ 3063.618741] EXT4-fs (loop3): #blocks per group too big: 8256 04:07:55 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c29, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000003402000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000034000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3063.778730] FAULT_INJECTION: forcing a failure. [ 3063.778730] name failslab, interval 1, probability 0, space 0, times 0 [ 3063.792269] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3063.800981] CPU: 1 PID: 16632 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3063.808870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3063.818212] Call Trace: [ 3063.820804] dump_stack+0x1fc/0x2ef [ 3063.824428] should_fail.cold+0xa/0xf [ 3063.828216] ? setup_fault_attr+0x200/0x200 [ 3063.832531] ? lock_acquire+0x170/0x3c0 [ 3063.836500] __should_failslab+0x115/0x180 [ 3063.840723] should_failslab+0x5/0x10 [ 3063.844507] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 3063.849605] ? throtl_add_bio_tg+0x1f0/0x1f0 [ 3063.854007] throtl_pd_alloc+0x6b/0x940 [ 3063.857965] ? throtl_add_bio_tg+0x1f0/0x1f0 [ 3063.862354] blkcg_activate_policy+0x120/0x5d0 [ 3063.866936] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 3063.871953] ? init_timer_key+0x88/0x350 [ 3063.876005] blk_throtl_init+0x40d/0x620 [ 3063.880051] ? blk_iolatency_init+0x1b7/0x2d0 [ 3063.884542] blkcg_init_queue+0x1e3/0x540 [ 3063.888685] blk_alloc_queue_node+0x7d0/0xbf0 [ 3063.893195] blk_mq_init_queue+0x44/0xa0 [ 3063.897248] loop_add+0x2cb/0x8a0 [ 3063.900687] loop_control_ioctl+0x16c/0x480 [ 3063.904997] ? loop_lookup+0x1d0/0x1d0 [ 3063.908867] ? ksys_write+0x241/0x2a0 [ 3063.912661] ? loop_lookup+0x1d0/0x1d0 [ 3063.916542] do_vfs_ioctl+0xcdb/0x12e0 [ 3063.920414] ? lock_downgrade+0x720/0x720 [ 3063.924547] ? check_preemption_disabled+0x41/0x280 [ 3063.929556] ? ioctl_preallocate+0x200/0x200 [ 3063.933967] ? __fget+0x356/0x510 [ 3063.937424] ? do_dup2+0x450/0x450 [ 3063.940951] ? vfs_write+0x393/0x540 [ 3063.944650] ? fput+0x2b/0x190 [ 3063.947827] ksys_ioctl+0x9b/0xc0 [ 3063.951277] __x64_sys_ioctl+0x6f/0xb0 [ 3063.955158] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3063.959722] do_syscall_64+0xf9/0x620 [ 3063.963527] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3063.968699] RIP: 0033:0x7f47f0c06109 [ 3063.972404] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3063.991311] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3063.999015] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3064.006266] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3064.013525] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3064.020784] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 04:07:55 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c2a, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020fc0020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3064.028034] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 04:07:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000035000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000002bd402000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3064.080732] EXT4-fs (loop2): Invalid log block size: 1073938432 [ 3064.087075] EXT4-fs (loop3): Invalid log cluster size: 50331648 04:07:55 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 27) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3064.220589] EXT4-fs (loop2): Invalid log block size: 1342373888 [ 3064.238855] FAULT_INJECTION: forcing a failure. [ 3064.238855] name failslab, interval 1, probability 0, space 0, times 0 [ 3064.250049] CPU: 0 PID: 16661 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3064.257917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3064.267257] Call Trace: [ 3064.269842] dump_stack+0x1fc/0x2ef [ 3064.273481] should_fail.cold+0xa/0xf [ 3064.277279] ? setup_fault_attr+0x200/0x200 [ 3064.281588] ? check_preemption_disabled+0x41/0x280 [ 3064.286593] __should_failslab+0x115/0x180 [ 3064.290829] should_failslab+0x5/0x10 [ 3064.294624] kmem_cache_alloc_node_trace+0x57/0x3b0 [ 3064.299629] throtl_pd_alloc+0x6b/0x940 [ 3064.303595] ? throtl_add_bio_tg+0x1f0/0x1f0 [ 3064.308124] blkcg_activate_policy+0x249/0x5d0 [ 3064.312713] blk_throtl_init+0x40d/0x620 [ 3064.316765] ? blk_iolatency_init+0x1b7/0x2d0 [ 3064.321259] blkcg_init_queue+0x1e3/0x540 [ 3064.325423] blk_alloc_queue_node+0x7d0/0xbf0 [ 3064.329933] blk_mq_init_queue+0x44/0xa0 [ 3064.334010] loop_add+0x2cb/0x8a0 [ 3064.337454] loop_control_ioctl+0x16c/0x480 [ 3064.341769] ? loop_lookup+0x1d0/0x1d0 [ 3064.345645] ? ksys_write+0x241/0x2a0 [ 3064.349430] ? loop_lookup+0x1d0/0x1d0 [ 3064.353316] do_vfs_ioctl+0xcdb/0x12e0 [ 3064.357201] ? lock_downgrade+0x720/0x720 [ 3064.361340] ? check_preemption_disabled+0x41/0x280 [ 3064.366367] ? ioctl_preallocate+0x200/0x200 [ 3064.370781] ? __fget+0x356/0x510 [ 3064.374242] ? do_dup2+0x450/0x450 [ 3064.377777] ? fput+0x2b/0x190 [ 3064.380971] ksys_ioctl+0x9b/0xc0 [ 3064.384417] __x64_sys_ioctl+0x6f/0xb0 [ 3064.388293] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3064.392864] do_syscall_64+0xf9/0x620 [ 3064.396653] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3064.401827] RIP: 0033:0x7f47f0c06109 04:07:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) (async) unshare(0x10000) (async) unshare(0x80) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) unshare(0x40000) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) unshare(0x80) r1 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) unshare(0x8040600) (async) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 04:07:56 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c2b, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3064.405535] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3064.424433] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3064.432122] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3064.439378] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3064.446636] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3064.453886] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3064.461136] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 04:07:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000005600000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:56 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 28) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3064.640384] EXT4-fs (loop3): Invalid log cluster size: 3171024896 [ 3064.655719] FAULT_INJECTION: forcing a failure. [ 3064.655719] name failslab, interval 1, probability 0, space 0, times 0 [ 3064.667562] CPU: 0 PID: 16685 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3064.668707] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3064.675445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3064.675451] Call Trace: [ 3064.675474] dump_stack+0x1fc/0x2ef [ 3064.675494] should_fail.cold+0xa/0xf [ 3064.675514] ? setup_fault_attr+0x200/0x200 [ 3064.707281] ? lock_acquire+0x170/0x3c0 [ 3064.711271] __should_failslab+0x115/0x180 [ 3064.715505] should_failslab+0x5/0x10 [ 3064.719299] kmem_cache_alloc_trace+0x284/0x380 [ 3064.723965] ? blk_mq_hctx_mark_pending+0x1f0/0x1f0 [ 3064.728965] ? plug_ctx_cmp+0x100/0x100 [ 3064.732927] blk_stat_alloc_callback+0x54/0x290 [ 3064.737599] blk_mq_init_allocated_queue+0x80/0x1300 [ 3064.742696] ? blkcg_init_queue+0x1fd/0x540 [ 3064.747003] ? blk_alloc_queue_node+0x7e4/0xbf0 [ 3064.751657] blk_mq_init_queue+0x5c/0xa0 [ 3064.755714] loop_add+0x2cb/0x8a0 [ 3064.759163] loop_control_ioctl+0x16c/0x480 [ 3064.763470] ? loop_lookup+0x1d0/0x1d0 [ 3064.767343] ? mark_held_locks+0xa6/0xf0 [ 3064.771385] ? ksys_write+0x241/0x2a0 [ 3064.775177] ? loop_lookup+0x1d0/0x1d0 [ 3064.779057] do_vfs_ioctl+0xcdb/0x12e0 [ 3064.782941] ? lock_downgrade+0x720/0x720 [ 3064.787080] ? check_preemption_disabled+0x41/0x280 [ 3064.792089] ? ioctl_preallocate+0x200/0x200 [ 3064.796582] ? __fget+0x356/0x510 [ 3064.800017] ? do_dup2+0x450/0x450 [ 3064.803539] ? ksys_write+0x241/0x2a0 [ 3064.807322] ? fput+0x2b/0x190 [ 3064.810512] ksys_ioctl+0x9b/0xc0 [ 3064.813960] __x64_sys_ioctl+0x6f/0xb0 [ 3064.817829] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3064.822406] do_syscall_64+0xf9/0x620 [ 3064.826200] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3064.831373] RIP: 0033:0x7f47f0c06109 [ 3064.835071] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3064.853954] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3064.861643] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3064.868904] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3064.876163] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3064.883421] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 04:07:56 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c2c, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3064.890682] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 04:07:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000000000020000000203c0120000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000002bd412000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3064.960211] EXT4-fs (loop2): Invalid log block size: 1442840576 04:07:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000005c00000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:56 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 29) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:56 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c2d, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3065.104742] EXT4-fs (loop2): Invalid log block size: 1543503872 [ 3065.134704] EXT4-fs (loop3): Invalid log cluster size: 3171024896 [ 3065.144852] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3065.172447] FAULT_INJECTION: forcing a failure. [ 3065.172447] name failslab, interval 1, probability 0, space 0, times 0 [ 3065.184849] CPU: 1 PID: 16719 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3065.192744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3065.202099] Call Trace: [ 3065.204695] dump_stack+0x1fc/0x2ef [ 3065.208321] should_fail.cold+0xa/0xf [ 3065.212112] ? setup_fault_attr+0x200/0x200 [ 3065.216423] ? lock_acquire+0x170/0x3c0 [ 3065.220400] __should_failslab+0x115/0x180 [ 3065.224633] should_failslab+0x5/0x10 [ 3065.228446] __kmalloc+0x2ab/0x3c0 [ 3065.231977] ? blk_stat_alloc_callback+0x81/0x290 [ 3065.236807] ? blk_mq_hctx_mark_pending+0x1f0/0x1f0 [ 3065.241815] ? plug_ctx_cmp+0x100/0x100 [ 3065.245792] blk_stat_alloc_callback+0x81/0x290 [ 3065.250457] blk_mq_init_allocated_queue+0x80/0x1300 [ 3065.255548] ? blkcg_init_queue+0x1fd/0x540 [ 3065.259872] ? blk_alloc_queue_node+0x7e4/0xbf0 [ 3065.264534] blk_mq_init_queue+0x5c/0xa0 [ 3065.268583] loop_add+0x2cb/0x8a0 [ 3065.272022] loop_control_ioctl+0x16c/0x480 [ 3065.276331] ? loop_lookup+0x1d0/0x1d0 [ 3065.280215] ? retint_kernel+0x2d/0x2d [ 3065.284112] ? loop_lookup+0x1d0/0x1d0 [ 3065.288000] do_vfs_ioctl+0xcdb/0x12e0 [ 3065.291885] ? lock_downgrade+0x720/0x720 [ 3065.296019] ? check_preemption_disabled+0x41/0x280 [ 3065.301030] ? ioctl_preallocate+0x200/0x200 [ 3065.305445] ? __fget+0x356/0x510 [ 3065.308897] ? do_dup2+0x450/0x450 [ 3065.312432] ? vfs_write+0x393/0x540 [ 3065.316142] ? fput+0x2b/0x190 [ 3065.319337] ksys_ioctl+0x9b/0xc0 [ 3065.322795] __x64_sys_ioctl+0x6f/0xb0 [ 3065.326676] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3065.331248] do_syscall_64+0xf9/0x620 [ 3065.335033] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3065.340219] RIP: 0033:0x7f47f0c06109 [ 3065.343936] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3065.362842] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 04:07:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000006000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3065.370554] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3065.377826] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3065.385092] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3065.392359] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3065.399631] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 04:07:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000002bd422000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x10000) unshare(0x80) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) unshare(0x20000000) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) unshare(0x20040800) unshare(0x40000) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) unshare(0x32000000) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x1010002, 0x0, 0x8990, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) unshare(0x20020800) 04:07:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000000000020000000207c0120000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:57 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 30) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:57 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c2e, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3065.544180] EXT4-fs (loop2): Invalid log block size: 1610612736 [ 3065.562033] EXT4-fs (loop3): Invalid log cluster size: 3171024896 04:07:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000002bd432000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3065.646459] FAULT_INJECTION: forcing a failure. [ 3065.646459] name failslab, interval 1, probability 0, space 0, times 0 [ 3065.658441] CPU: 1 PID: 16742 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3065.666319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3065.675665] Call Trace: [ 3065.678243] dump_stack+0x1fc/0x2ef [ 3065.681878] should_fail.cold+0xa/0xf [ 3065.685674] ? setup_fault_attr+0x200/0x200 [ 3065.689993] ? lock_acquire+0x170/0x3c0 [ 3065.693966] __should_failslab+0x115/0x180 [ 3065.698187] should_failslab+0x5/0x10 [ 3065.701982] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 3065.707085] __kmalloc_node+0x38/0x70 [ 3065.710885] blk_mq_init_allocated_queue+0x178/0x1300 [ 3065.716084] ? blkcg_init_queue+0x1fd/0x540 [ 3065.720414] blk_mq_init_queue+0x5c/0xa0 [ 3065.724479] loop_add+0x2cb/0x8a0 [ 3065.727928] loop_control_ioctl+0x16c/0x480 [ 3065.732236] ? loop_lookup+0x1d0/0x1d0 [ 3065.736104] ? loop_lookup+0x1d0/0x1d0 [ 3065.739994] ? loop_lookup+0x1d0/0x1d0 [ 3065.743886] do_vfs_ioctl+0xcdb/0x12e0 [ 3065.747770] ? lock_downgrade+0x720/0x720 [ 3065.751925] ? check_preemption_disabled+0x41/0x280 [ 3065.756935] ? ioctl_preallocate+0x200/0x200 [ 3065.761350] ? __fget+0x356/0x510 [ 3065.764807] ? do_dup2+0x450/0x450 [ 3065.768348] ksys_ioctl+0x9b/0xc0 [ 3065.771798] __x64_sys_ioctl+0x6f/0xb0 [ 3065.775679] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3065.780257] do_syscall_64+0xf9/0x620 [ 3065.784063] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3065.789259] RIP: 0033:0x7f47f0c06109 [ 3065.792965] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3065.812083] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3065.819788] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3065.827056] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3065.834310] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3065.841568] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3065.848833] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 04:07:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000886000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:57 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 31) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:57 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c2f, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3065.940525] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020020220000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3065.981940] EXT4-fs (loop3): Invalid log cluster size: 3171024896 [ 3066.013002] FAULT_INJECTION: forcing a failure. [ 3066.013002] name failslab, interval 1, probability 0, space 0, times 0 [ 3066.026812] CPU: 0 PID: 16766 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3066.034710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3066.044064] Call Trace: [ 3066.046652] dump_stack+0x1fc/0x2ef [ 3066.050273] should_fail.cold+0xa/0xf [ 3066.054066] ? setup_fault_attr+0x200/0x200 [ 3066.058377] ? mutex_trylock+0x1a0/0x1a0 [ 3066.062430] __should_failslab+0x115/0x180 [ 3066.066654] should_failslab+0x5/0x10 [ 3066.070447] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 3066.075541] __kmalloc_node+0x38/0x70 [ 3066.079336] blk_mq_realloc_hw_ctxs+0x1d8/0x1000 [ 3066.084082] ? kmem_cache_alloc_node_trace+0x351/0x3b0 [ 3066.089358] blk_mq_init_allocated_queue+0x20c/0x1300 [ 3066.094535] ? blkcg_init_queue+0x1fd/0x540 [ 3066.098852] blk_mq_init_queue+0x5c/0xa0 [ 3066.102906] loop_add+0x2cb/0x8a0 [ 3066.106352] loop_control_ioctl+0x16c/0x480 [ 3066.110663] ? loop_lookup+0x1d0/0x1d0 [ 3066.114542] ? __schedule+0x88f/0x2040 [ 3066.118419] ? ksys_write+0x241/0x2a0 [ 3066.122207] ? loop_lookup+0x1d0/0x1d0 [ 3066.126086] do_vfs_ioctl+0xcdb/0x12e0 [ 3066.129966] ? lock_downgrade+0x720/0x720 [ 3066.134105] ? check_preemption_disabled+0x41/0x280 [ 3066.139111] ? ioctl_preallocate+0x200/0x200 [ 3066.143512] ? __fget+0x356/0x510 [ 3066.146956] ? do_dup2+0x450/0x450 [ 3066.150485] ? __fdget+0x83/0x230 [ 3066.153930] ksys_ioctl+0x9b/0xc0 [ 3066.157372] __x64_sys_ioctl+0x6f/0xb0 [ 3066.161248] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3066.165816] do_syscall_64+0xf9/0x620 [ 3066.169610] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3066.174785] RIP: 0033:0x7f47f0c06109 [ 3066.178485] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3066.197371] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3066.205067] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3066.212322] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3066.219581] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 04:07:57 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c30, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3066.226836] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3066.234093] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 [ 3066.267779] EXT4-fs (loop2): Invalid log block size: 1619525632 04:07:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) (async) unshare(0x10000) (async) unshare(0x80) (async) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) unshare(0x20000000) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) (async) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) unshare(0x20040800) (async, rerun: 32) unshare(0x40000) (async, rerun: 32) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) unshare(0x32000000) (async) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x1010002, 0x0, 0x8990, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) unshare(0x20020800) 04:07:57 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 32) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000002bd442000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000017400000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3066.415108] FAULT_INJECTION: forcing a failure. [ 3066.415108] name failslab, interval 1, probability 0, space 0, times 0 [ 3066.427069] CPU: 0 PID: 16785 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3066.435044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3066.444394] Call Trace: [ 3066.446967] dump_stack+0x1fc/0x2ef [ 3066.450581] should_fail.cold+0xa/0xf [ 3066.454370] ? setup_fault_attr+0x200/0x200 [ 3066.458688] ? __debug_object_init+0x410/0x9b0 [ 3066.463278] __should_failslab+0x115/0x180 [ 3066.467511] should_failslab+0x5/0x10 [ 3066.471305] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 3066.476395] __kmalloc_node+0x38/0x70 [ 3066.480187] blk_mq_realloc_hw_ctxs+0x568/0x1000 [ 3066.484934] blk_mq_init_allocated_queue+0x20c/0x1300 [ 3066.490108] ? blk_alloc_queue_node+0x7e4/0xbf0 [ 3066.494769] blk_mq_init_queue+0x5c/0xa0 [ 3066.498818] loop_add+0x2cb/0x8a0 [ 3066.502274] loop_control_ioctl+0x16c/0x480 [ 3066.506586] ? loop_lookup+0x1d0/0x1d0 [ 3066.510457] ? ksys_write+0x241/0x2a0 [ 3066.514242] ? loop_lookup+0x1d0/0x1d0 [ 3066.518114] do_vfs_ioctl+0xcdb/0x12e0 [ 3066.521986] ? lock_downgrade+0x720/0x720 [ 3066.526120] ? check_preemption_disabled+0x41/0x280 [ 3066.531127] ? ioctl_preallocate+0x200/0x200 [ 3066.535530] ? __fget+0x356/0x510 [ 3066.538978] ? do_dup2+0x450/0x450 [ 3066.542519] ? retint_kernel+0x2d/0x2d [ 3066.546393] ksys_ioctl+0x9b/0xc0 [ 3066.549915] __x64_sys_ioctl+0x6f/0xb0 [ 3066.553787] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3066.558351] do_syscall_64+0xf9/0x620 [ 3066.562136] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3066.567306] RIP: 0033:0x7f47f0c06109 [ 3066.571003] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3066.589888] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3066.597576] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3066.604825] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 04:07:58 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c31, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3066.612074] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3066.619325] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3066.626577] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 [ 3066.698633] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3066.735116] EXT4-fs (loop3): Invalid log cluster size: 3171024896 04:07:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000002bd452000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020100220000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:58 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 33) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3066.771043] EXT4-fs (loop2): Invalid log block size: 1946222592 04:07:58 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c32, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3066.866030] FAULT_INJECTION: forcing a failure. [ 3066.866030] name failslab, interval 1, probability 0, space 0, times 0 [ 3066.878166] CPU: 0 PID: 16812 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3066.886047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3066.895389] Call Trace: [ 3066.897975] dump_stack+0x1fc/0x2ef [ 3066.901591] should_fail.cold+0xa/0xf [ 3066.905378] ? setup_fault_attr+0x200/0x200 [ 3066.909679] ? should_fail+0x142/0x7b0 [ 3066.913565] __should_failslab+0x115/0x180 [ 3066.917795] should_failslab+0x5/0x10 [ 3066.921578] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 3066.926670] __kmalloc_node+0x38/0x70 [ 3066.930454] sbitmap_init_node+0x123/0x440 [ 3066.934681] blk_mq_realloc_hw_ctxs+0x5db/0x1000 [ 3066.939428] blk_mq_init_allocated_queue+0x20c/0x1300 [ 3066.944601] ? blkcg_init_queue+0x1fd/0x540 [ 3066.948922] blk_mq_init_queue+0x5c/0xa0 [ 3066.952994] loop_add+0x2cb/0x8a0 [ 3066.956442] loop_control_ioctl+0x16c/0x480 [ 3066.960754] ? loop_lookup+0x1d0/0x1d0 [ 3066.964625] ? retint_kernel+0x2d/0x2d [ 3066.968508] ? loop_lookup+0x1d0/0x1d0 [ 3066.972379] do_vfs_ioctl+0xcdb/0x12e0 [ 3066.976255] ? lock_downgrade+0x720/0x720 [ 3066.980400] ? check_preemption_disabled+0x41/0x280 [ 3066.985416] ? ioctl_preallocate+0x200/0x200 [ 3066.989833] ? __fget+0x356/0x510 [ 3066.993284] ? do_dup2+0x450/0x450 [ 3066.996807] ? vfs_write+0x393/0x540 [ 3067.000506] ? fput+0x2b/0x190 [ 3067.003683] ksys_ioctl+0x9b/0xc0 [ 3067.007122] __x64_sys_ioctl+0x6f/0xb0 [ 3067.011001] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3067.015574] do_syscall_64+0xf9/0x620 [ 3067.019363] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3067.024536] RIP: 0033:0x7f47f0c06109 [ 3067.028236] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3067.047129] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3067.054843] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3067.062103] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3067.069353] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3067.076603] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3067.083851] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 04:07:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000017c00000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) (async) unshare(0x10000) unshare(0x80) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) unshare(0x20000000) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) (async) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) (async) unshare(0x20040800) unshare(0x40000) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) (async) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (async) unshare(0x32000000) (async) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x1010002, 0x0, 0x8990, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) unshare(0x20020800) 04:07:58 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c33, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000002bd462000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3067.140772] EXT4-fs (loop3): Invalid log cluster size: 3171024896 04:07:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000320000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:58 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 34) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3067.291176] EXT4-fs (loop2): Invalid log block size: 2080440320 [ 3067.300188] EXT4-fs (loop3): Invalid log cluster size: 3171024896 04:07:58 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c34, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000003a400000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3067.394344] FAULT_INJECTION: forcing a failure. [ 3067.394344] name failslab, interval 1, probability 0, space 0, times 0 [ 3067.406037] CPU: 1 PID: 16848 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3067.413916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3067.423254] Call Trace: [ 3067.425829] dump_stack+0x1fc/0x2ef [ 3067.429456] should_fail.cold+0xa/0xf [ 3067.433254] ? setup_fault_attr+0x200/0x200 [ 3067.437561] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3067.442151] __should_failslab+0x115/0x180 [ 3067.446380] should_failslab+0x5/0x10 [ 3067.450175] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 3067.455273] blk_alloc_flush_queue+0x76/0x300 [ 3067.459765] blk_mq_realloc_hw_ctxs+0x7bc/0x1000 [ 3067.464519] blk_mq_init_allocated_queue+0x20c/0x1300 [ 3067.469709] ? blkcg_init_queue+0x1fd/0x540 [ 3067.474027] blk_mq_init_queue+0x5c/0xa0 [ 3067.478072] loop_add+0x2cb/0x8a0 [ 3067.481525] loop_control_ioctl+0x16c/0x480 [ 3067.485839] ? loop_lookup+0x1d0/0x1d0 [ 3067.489720] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3067.494296] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3067.499052] ? loop_lookup+0x1d0/0x1d0 [ 3067.502931] do_vfs_ioctl+0xcdb/0x12e0 [ 3067.506813] ? lock_downgrade+0x720/0x720 [ 3067.510955] ? ioctl_preallocate+0x200/0x200 [ 3067.515348] ? __fget+0x356/0x510 [ 3067.518782] ? do_dup2+0x450/0x450 [ 3067.522315] ? vfs_write+0x393/0x540 [ 3067.526023] ? fput+0x2b/0x190 [ 3067.529216] ksys_ioctl+0x9b/0xc0 [ 3067.532661] __x64_sys_ioctl+0x6f/0xb0 [ 3067.536533] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3067.541106] do_syscall_64+0xf9/0x620 [ 3067.544906] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3067.550085] RIP: 0033:0x7f47f0c06109 [ 3067.553802] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3067.572690] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3067.580387] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3067.587670] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 04:07:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000002bd472000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3067.594922] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3067.602178] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3067.609453] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 [ 3067.656240] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:59 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c35, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020ac0320000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000002bd482000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:59 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 35) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3067.698707] EXT4-fs (loop3): Invalid log cluster size: 3171024896 [ 3067.794547] EXT4-fs (loop2): Invalid log block size: 2751660032 [ 3067.889949] FAULT_INJECTION: forcing a failure. [ 3067.889949] name failslab, interval 1, probability 0, space 0, times 0 [ 3067.902240] CPU: 0 PID: 16877 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3067.910139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3067.919489] Call Trace: [ 3067.922062] dump_stack+0x1fc/0x2ef [ 3067.925685] should_fail.cold+0xa/0xf [ 3067.929480] ? setup_fault_attr+0x200/0x200 [ 3067.933788] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3067.938355] __should_failslab+0x115/0x180 [ 3067.942576] should_failslab+0x5/0x10 [ 3067.946379] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 3067.951477] __kmalloc_node+0x38/0x70 [ 3067.955267] blk_alloc_flush_queue+0x120/0x300 [ 3067.959854] blk_mq_realloc_hw_ctxs+0x7bc/0x1000 [ 3067.964605] blk_mq_init_allocated_queue+0x20c/0x1300 [ 3067.969792] ? blkcg_init_queue+0x1fd/0x540 [ 3067.974107] blk_mq_init_queue+0x5c/0xa0 [ 3067.978161] loop_add+0x2cb/0x8a0 [ 3067.981599] loop_control_ioctl+0x16c/0x480 [ 3067.985904] ? loop_lookup+0x1d0/0x1d0 [ 3067.989776] ? ksys_write+0x241/0x2a0 [ 3067.993572] ? loop_lookup+0x1d0/0x1d0 [ 3067.997448] do_vfs_ioctl+0xcdb/0x12e0 [ 3068.001317] ? lock_downgrade+0x720/0x720 [ 3068.005457] ? check_preemption_disabled+0x41/0x280 [ 3068.010469] ? ioctl_preallocate+0x200/0x200 [ 3068.014876] ? __fget+0x356/0x510 [ 3068.018324] ? do_dup2+0x450/0x450 [ 3068.021850] ksys_ioctl+0x9b/0xc0 [ 3068.025295] __x64_sys_ioctl+0x6f/0xb0 [ 3068.029172] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3068.033741] do_syscall_64+0xf9/0x620 [ 3068.037532] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3068.042709] RIP: 0033:0x7f47f0c06109 [ 3068.046409] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3068.065293] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3068.072990] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3068.080245] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 04:07:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x10000) unshare(0x80) socket$nl_route(0x10, 0x3, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x4000000) unshare(0x0) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) unshare(0x40000) unshare(0x2020100) 04:07:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000003d000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:07:59 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c36, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000002bd492000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3068.087497] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3068.094752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3068.102009] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 [ 3068.118502] EXT4-fs (loop3): Invalid log cluster size: 3171024896 04:07:59 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 36) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020d00320000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3068.184390] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:07:59 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c37, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:07:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000001e400000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3068.247889] EXT4-fs (loop2): Invalid log block size: 3489857536 [ 3068.353758] FAULT_INJECTION: forcing a failure. [ 3068.353758] name failslab, interval 1, probability 0, space 0, times 0 [ 3068.365769] CPU: 0 PID: 16904 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3068.373675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3068.383016] Call Trace: [ 3068.385591] dump_stack+0x1fc/0x2ef [ 3068.389217] should_fail.cold+0xa/0xf [ 3068.393018] ? setup_fault_attr+0x200/0x200 [ 3068.397320] ? lock_acquire+0x170/0x3c0 [ 3068.401280] __should_failslab+0x115/0x180 [ 3068.405506] should_failslab+0x5/0x10 [ 3068.409291] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 3068.414379] blk_mq_init_tags+0x6a/0x2b0 [ 3068.418432] blk_mq_alloc_rq_map+0x9d/0x230 [ 3068.422737] ? elevator_get+0x29/0x170 [ 3068.426606] blk_mq_init_sched+0x219/0x730 [ 3068.430826] elevator_init_mq+0xf0/0x180 [ 3068.434870] blk_mq_init_allocated_queue+0xe1f/0x1300 [ 3068.440071] blk_mq_init_queue+0x5c/0xa0 [ 3068.444131] loop_add+0x2cb/0x8a0 [ 3068.447570] loop_control_ioctl+0x16c/0x480 [ 3068.451876] ? loop_lookup+0x1d0/0x1d0 [ 3068.455765] ? loop_lookup+0x1d0/0x1d0 [ 3068.459636] do_vfs_ioctl+0xcdb/0x12e0 [ 3068.463518] ? lock_downgrade+0x720/0x720 [ 3068.467668] ? check_preemption_disabled+0x41/0x280 [ 3068.472683] ? ioctl_preallocate+0x200/0x200 [ 3068.477084] ? __fget+0x356/0x510 [ 3068.480525] ? do_dup2+0x450/0x450 [ 3068.484051] ? vfs_write+0x393/0x540 [ 3068.487757] ? fput+0x2b/0x190 [ 3068.490948] ksys_ioctl+0x9b/0xc0 [ 3068.494400] __x64_sys_ioctl+0x6f/0xb0 [ 3068.498270] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3068.502848] do_syscall_64+0xf9/0x620 [ 3068.506644] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3068.511818] RIP: 0033:0x7f47f0c06109 [ 3068.515524] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3068.534416] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3068.542122] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3068.549384] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3068.556642] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3068.563902] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3068.571156] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 04:08:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020fc0320000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3068.609302] EXT4-fs (loop3): Invalid log cluster size: 3171024896 [ 3068.618804] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:08:00 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 37) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:08:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000002bd4a2000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:08:00 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c39, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3068.667376] EXT4-fs (loop2): Invalid log block size: 3825270784 [ 3068.816438] FAULT_INJECTION: forcing a failure. [ 3068.816438] name failslab, interval 1, probability 0, space 0, times 0 [ 3068.829224] CPU: 0 PID: 16937 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3068.837113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3068.846452] Call Trace: [ 3068.849033] dump_stack+0x1fc/0x2ef [ 3068.852647] should_fail.cold+0xa/0xf [ 3068.856441] ? setup_fault_attr+0x200/0x200 [ 3068.860753] ? lock_acquire+0x170/0x3c0 [ 3068.864716] __should_failslab+0x115/0x180 [ 3068.868948] should_failslab+0x5/0x10 [ 3068.872742] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 3068.877834] __kmalloc_node+0x38/0x70 [ 3068.881622] sbitmap_init_node+0x123/0x440 [ 3068.885862] sbitmap_queue_init_node+0x37/0x6c0 [ 3068.890541] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 3068.895556] blk_mq_init_tags+0x10d/0x2b0 [ 3068.899696] blk_mq_alloc_rq_map+0x9d/0x230 [ 3068.904009] ? elevator_get+0x29/0x170 [ 3068.907880] blk_mq_init_sched+0x219/0x730 [ 3068.912100] elevator_init_mq+0xf0/0x180 [ 3068.916146] blk_mq_init_allocated_queue+0xe1f/0x1300 [ 3068.921323] blk_mq_init_queue+0x5c/0xa0 [ 3068.925368] loop_add+0x2cb/0x8a0 [ 3068.928805] loop_control_ioctl+0x16c/0x480 [ 3068.933114] ? loop_lookup+0x1d0/0x1d0 [ 3068.937004] ? ksys_write+0x241/0x2a0 [ 3068.940788] ? loop_lookup+0x1d0/0x1d0 [ 3068.944668] do_vfs_ioctl+0xcdb/0x12e0 [ 3068.948636] ? lock_downgrade+0x720/0x720 [ 3068.952769] ? check_preemption_disabled+0x41/0x280 [ 3068.957771] ? ioctl_preallocate+0x200/0x200 [ 3068.962166] ? __fget+0x356/0x510 [ 3068.965603] ? do_dup2+0x450/0x450 [ 3068.969144] ? vfs_write+0x393/0x540 [ 3068.972849] ? fput+0x2b/0x190 [ 3068.976026] ksys_ioctl+0x9b/0xc0 [ 3068.979462] __x64_sys_ioctl+0x6f/0xb0 [ 3068.983330] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3068.987902] do_syscall_64+0xf9/0x620 [ 3068.991702] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3068.996876] RIP: 0033:0x7f47f0c06109 04:08:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x10000) unshare(0x80) socket$nl_route(0x10, 0x3, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x4000000) unshare(0x0) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) unshare(0x40000) unshare(0x2020100) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) unshare(0x18010100) (async) unshare(0x10000) (async) unshare(0x80) (async) socket$nl_route(0x10, 0x3, 0x0) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x4000000) (async) unshare(0x0) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) (async) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) unshare(0x40000) (async) unshare(0x2020100) (async) 04:08:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000003ea00000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:08:00 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c3a, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3069.000574] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3069.019472] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3069.027182] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3069.034437] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3069.041698] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3069.048959] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3069.056215] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 04:08:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000002bd4b2000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3069.094635] EXT4-fs (loop3): Invalid log cluster size: 3171024896 [ 3069.129370] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:08:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020100420000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:08:00 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 38) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:08:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) unshare(0x18010100) (async, rerun: 64) unshare(0x10000) (async) unshare(0x80) (async) socket$nl_route(0x10, 0x3, 0x0) (async) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x4000000) (async) unshare(0x0) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) (async) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) unshare(0x40000) (async, rerun: 32) unshare(0x2020100) (rerun: 32) [ 3069.221812] EXT4-fs (loop2): Invalid log block size: 3926065152 04:08:00 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) unshare(0x8000000) clock_gettime(0x0, &(0x7f0000000140)) mq_timedsend(0xffffffffffffffff, &(0x7f00000001c0)="339b951ab2aee1804a32eab93a0893575b29d57fe4a52c8677ba41f663bac308a6489528e76d58b5dac04c35cfd2a5abc95f38a749de8cd794de8b5224502d317308e44f53d0aa4b3b1bf592d028c88d7869cfd082dca84fc6afb4b6bdc1292972e7ca3c38cc08a37d044bf3a7392c75fc649b95c26414068a1e32d4f49bb50d83569543c56022957a694bc0e049a5f7fd2065cbab63997f86dcc6044a3c0fd2e26071022eb3521edaf8814754", 0xad, 0x400, &(0x7f0000000000)={0x0, 0x3938700}) unshare(0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) mq_timedreceive(r2, &(0x7f0000000280)=""/238, 0xee, 0x3, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) [ 3069.277721] FAULT_INJECTION: forcing a failure. [ 3069.277721] name failslab, interval 1, probability 0, space 0, times 0 [ 3069.289871] CPU: 0 PID: 16974 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3069.297773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3069.307142] Call Trace: [ 3069.309752] dump_stack+0x1fc/0x2ef [ 3069.313396] should_fail.cold+0xa/0xf [ 3069.317211] ? setup_fault_attr+0x200/0x200 [ 3069.321533] ? lock_acquire+0x170/0x3c0 [ 3069.325510] __should_failslab+0x115/0x180 [ 3069.329735] should_failslab+0x5/0x10 [ 3069.333532] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 3069.338645] sbitmap_queue_init_node+0x240/0x6c0 [ 3069.343395] blk_mq_init_tags+0x10d/0x2b0 [ 3069.347532] blk_mq_alloc_rq_map+0x9d/0x230 [ 3069.351839] ? elevator_find+0x121/0x150 [ 3069.355885] blk_mq_init_sched+0x219/0x730 [ 3069.360109] elevator_init_mq+0xf0/0x180 [ 3069.364153] blk_mq_init_allocated_queue+0xe1f/0x1300 [ 3069.369349] blk_mq_init_queue+0x5c/0xa0 [ 3069.373405] loop_add+0x2cb/0x8a0 [ 3069.376844] loop_control_ioctl+0x16c/0x480 [ 3069.381148] ? loop_lookup+0x1d0/0x1d0 [ 3069.385033] ? loop_lookup+0x1d0/0x1d0 [ 3069.388911] ? loop_lookup+0x1d0/0x1d0 [ 3069.392786] do_vfs_ioctl+0xcdb/0x12e0 [ 3069.396676] ? lock_downgrade+0x720/0x720 [ 3069.400821] ? check_preemption_disabled+0x41/0x280 [ 3069.405845] ? ioctl_preallocate+0x200/0x200 [ 3069.410267] ? __fget+0x356/0x510 [ 3069.413719] ? do_dup2+0x450/0x450 [ 3069.417255] ? vfs_write+0x393/0x540 [ 3069.420964] ? fput+0x2b/0x190 [ 3069.424147] ksys_ioctl+0x9b/0xc0 [ 3069.427588] __x64_sys_ioctl+0x6f/0xb0 [ 3069.431589] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3069.436155] do_syscall_64+0xf9/0x620 [ 3069.439960] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3069.445155] RIP: 0033:0x7f47f0c06109 [ 3069.448884] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3069.467789] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 04:08:01 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c3b, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3069.475506] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3069.482766] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3069.490025] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3069.497289] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3069.504554] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 04:08:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000001ec00000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3069.584898] EXT4-fs (loop3): Invalid log cluster size: 3171024896 04:08:01 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 39) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:08:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000002bd4c2000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:08:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000520000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:08:01 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c3c, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3069.705024] EXT4-fs (loop2): Invalid log block size: 3959488512 [ 3069.714213] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3069.780194] FAULT_INJECTION: forcing a failure. [ 3069.780194] name failslab, interval 1, probability 0, space 0, times 0 [ 3069.799131] CPU: 0 PID: 17014 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3069.807028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3069.816374] Call Trace: [ 3069.818964] dump_stack+0x1fc/0x2ef [ 3069.822590] should_fail.cold+0xa/0xf [ 3069.826377] ? setup_fault_attr+0x200/0x200 [ 3069.830705] __should_failslab+0x115/0x180 [ 3069.834941] should_failslab+0x5/0x10 [ 3069.838738] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 3069.843849] sbitmap_queue_init_node+0x240/0x6c0 [ 3069.848610] blk_mq_init_tags+0x10d/0x2b0 [ 3069.852779] blk_mq_alloc_rq_map+0x9d/0x230 [ 3069.857096] ? elevator_get+0x29/0x170 [ 3069.860975] blk_mq_init_sched+0x219/0x730 [ 3069.865242] elevator_init_mq+0xf0/0x180 [ 3069.869312] blk_mq_init_allocated_queue+0xe1f/0x1300 [ 3069.874493] blk_mq_init_queue+0x5c/0xa0 [ 3069.878545] loop_add+0x2cb/0x8a0 [ 3069.882003] loop_control_ioctl+0x16c/0x480 [ 3069.886419] ? loop_lookup+0x1d0/0x1d0 [ 3069.890305] ? lock_release+0x429/0x8b0 [ 3069.894262] ? loop_lookup+0x1d0/0x1d0 [ 3069.898136] do_vfs_ioctl+0xcdb/0x12e0 [ 3069.902023] ? lock_downgrade+0x720/0x720 [ 3069.906163] ? check_preemption_disabled+0x41/0x280 [ 3069.911173] ? ioctl_preallocate+0x200/0x200 [ 3069.915588] ? __fget+0x356/0x510 [ 3069.919037] ? do_dup2+0x450/0x450 [ 3069.922558] ? vfs_write+0x393/0x540 [ 3069.926255] ? fput+0x2b/0x190 [ 3069.929451] ksys_ioctl+0x9b/0xc0 [ 3069.932902] __x64_sys_ioctl+0x6f/0xb0 [ 3069.936848] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3069.941438] do_syscall_64+0xf9/0x620 [ 3069.945239] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3069.950431] RIP: 0033:0x7f47f0c06109 [ 3069.954135] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3069.973016] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3069.980705] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3069.987965] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3069.995225] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3070.002482] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3070.009742] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 04:08:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000c0ed00000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:08:01 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c3d, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:08:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000620000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3070.053804] EXT4-fs (loop3): Invalid log cluster size: 3171024896 04:08:01 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) unshare(0x18010100) (async) unshare(0x10000) (async) unshare(0x80) (async) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async) unshare(0x8000000) clock_gettime(0x0, &(0x7f0000000140)) mq_timedsend(0xffffffffffffffff, &(0x7f00000001c0)="339b951ab2aee1804a32eab93a0893575b29d57fe4a52c8677ba41f663bac308a6489528e76d58b5dac04c35cfd2a5abc95f38a749de8cd794de8b5224502d317308e44f53d0aa4b3b1bf592d028c88d7869cfd082dca84fc6afb4b6bdc1292972e7ca3c38cc08a37d044bf3a7392c75fc649b95c26414068a1e32d4f49bb50d83569543c56022957a694bc0e049a5f7fd2065cbab63997f86dcc6044a3c0fd2e26071022eb3521edaf8814754", 0xad, 0x400, &(0x7f0000000000)={0x0, 0x3938700}) unshare(0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) mq_timedreceive(r2, &(0x7f0000000280)=""/238, 0xee, 0x3, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) 04:08:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000002bd4d2000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:08:01 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 40) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:08:01 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c3e, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:08:01 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) unshare(0x18010100) (async) unshare(0x10000) (async, rerun: 64) unshare(0x80) (rerun: 64) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) unshare(0x8000000) clock_gettime(0x0, &(0x7f0000000140)) (async) mq_timedsend(0xffffffffffffffff, &(0x7f00000001c0)="339b951ab2aee1804a32eab93a0893575b29d57fe4a52c8677ba41f663bac308a6489528e76d58b5dac04c35cfd2a5abc95f38a749de8cd794de8b5224502d317308e44f53d0aa4b3b1bf592d028c88d7869cfd082dca84fc6afb4b6bdc1292972e7ca3c38cc08a37d044bf3a7392c75fc649b95c26414068a1e32d4f49bb50d83569543c56022957a694bc0e049a5f7fd2065cbab63997f86dcc6044a3c0fd2e26071022eb3521edaf8814754", 0xad, 0x400, &(0x7f0000000000)={0x0, 0x3938700}) unshare(0x0) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (rerun: 64) mq_timedreceive(r2, &(0x7f0000000280)=""/238, 0xee, 0x3, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) [ 3070.228316] EXT4-fs (loop2): Invalid log block size: 3988783104 [ 3070.237065] EXT4-fs (loop3): Invalid log cluster size: 3171024896 [ 3070.252513] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:08:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000002fa00000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:08:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000720000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3070.351918] FAULT_INJECTION: forcing a failure. [ 3070.351918] name failslab, interval 1, probability 0, space 0, times 0 [ 3070.377202] CPU: 0 PID: 17057 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3070.385114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3070.394459] Call Trace: [ 3070.397039] dump_stack+0x1fc/0x2ef [ 3070.400659] should_fail.cold+0xa/0xf [ 3070.404451] ? setup_fault_attr+0x200/0x200 [ 3070.408765] ? __lockdep_init_map+0x100/0x5a0 [ 3070.413258] __should_failslab+0x115/0x180 [ 3070.417490] should_failslab+0x5/0x10 [ 3070.421280] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 3070.426374] __kmalloc_node+0x38/0x70 [ 3070.430166] blk_mq_alloc_rq_map+0xdf/0x230 [ 3070.434474] ? elevator_get+0x29/0x170 [ 3070.438348] blk_mq_init_sched+0x219/0x730 [ 3070.442578] elevator_init_mq+0xf0/0x180 [ 3070.446632] blk_mq_init_allocated_queue+0xe1f/0x1300 [ 3070.451821] blk_mq_init_queue+0x5c/0xa0 [ 3070.455870] loop_add+0x2cb/0x8a0 [ 3070.459332] loop_control_ioctl+0x16c/0x480 [ 3070.463646] ? loop_lookup+0x1d0/0x1d0 [ 3070.467530] ? loop_lookup+0x1d0/0x1d0 [ 3070.471411] do_vfs_ioctl+0xcdb/0x12e0 [ 3070.475294] ? lock_downgrade+0x720/0x720 [ 3070.479441] ? check_preemption_disabled+0x41/0x280 [ 3070.484455] ? ioctl_preallocate+0x200/0x200 [ 3070.488861] ? __fget+0x356/0x510 [ 3070.492312] ? do_dup2+0x450/0x450 [ 3070.495845] ? fput+0x2b/0x190 [ 3070.499033] ksys_ioctl+0x9b/0xc0 [ 3070.502478] __x64_sys_ioctl+0x6f/0xb0 [ 3070.506358] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3070.510930] do_syscall_64+0xf9/0x620 [ 3070.514731] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3070.519916] RIP: 0033:0x7f47f0c06109 [ 3070.523642] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3070.542529] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3070.550225] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3070.557482] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3070.564738] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3070.571991] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3070.579247] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 04:08:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000002bd4e2000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:08:02 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 41) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:08:02 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c41, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3070.736719] EXT4-fs (loop3): Invalid log cluster size: 3171024896 [ 3070.744940] EXT4-fs (loop2): Invalid log block size: 4194435072 [ 3070.840218] FAULT_INJECTION: forcing a failure. [ 3070.840218] name failslab, interval 1, probability 0, space 0, times 0 [ 3070.859322] CPU: 0 PID: 17088 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3070.867214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3070.876561] Call Trace: [ 3070.879140] dump_stack+0x1fc/0x2ef [ 3070.882768] should_fail.cold+0xa/0xf [ 3070.886562] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3070.891303] ? setup_fault_attr+0x200/0x200 [ 3070.895613] ? rcu_nmi_exit+0xb3/0x180 [ 3070.899501] __should_failslab+0x115/0x180 [ 3070.903732] should_failslab+0x5/0x10 [ 3070.907523] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 3070.912611] __kmalloc_node+0x38/0x70 [ 3070.916412] blk_mq_alloc_rq_map+0x120/0x230 [ 3070.920821] ? elevator_get+0x29/0x170 [ 3070.924703] blk_mq_init_sched+0x219/0x730 [ 3070.928927] elevator_init_mq+0xf0/0x180 [ 3070.932988] blk_mq_init_allocated_queue+0xe1f/0x1300 [ 3070.938178] blk_mq_init_queue+0x5c/0xa0 [ 3070.942747] loop_add+0x2cb/0x8a0 [ 3070.946185] loop_control_ioctl+0x16c/0x480 [ 3070.950497] ? loop_lookup+0x1d0/0x1d0 [ 3070.954381] ? loop_lookup+0x1d0/0x1d0 [ 3070.958282] ? loop_lookup+0x1d0/0x1d0 [ 3070.962167] do_vfs_ioctl+0xcdb/0x12e0 [ 3070.966049] ? lock_downgrade+0x720/0x720 [ 3070.970178] ? check_preemption_disabled+0x41/0x280 [ 3070.975189] ? ioctl_preallocate+0x200/0x200 [ 3070.979606] ? __fget+0x356/0x510 [ 3070.983052] ? do_dup2+0x450/0x450 [ 3070.986575] ? vfs_write+0x393/0x540 [ 3070.990270] ? fput+0x2b/0x190 [ 3070.993458] ksys_ioctl+0x9b/0xc0 [ 3070.996898] __x64_sys_ioctl+0x6f/0xb0 [ 3071.000782] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3071.005353] do_syscall_64+0xf9/0x620 [ 3071.009139] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3071.014308] RIP: 0033:0x7f47f0c06109 [ 3071.018015] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3071.036908] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3071.044602] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3071.051862] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3071.059123] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3071.066379] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3071.073633] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 04:08:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000002bd4f2000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:08:02 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c42, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:08:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000fc00000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:08:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000920000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:08:02 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 42) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:08:02 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x42a40, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000000c0)={0x4, [0x2, 0xff, 0xf9, 0x9]}, &(0x7f0000000100)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) [ 3071.135293] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3071.163900] EXT4-fs (loop3): Invalid log cluster size: 3171024896 04:08:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000003502000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:08:02 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c43, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3071.299975] EXT4-fs (loop2): Invalid log block size: 4227858432 [ 3071.314152] FAULT_INJECTION: forcing a failure. [ 3071.314152] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3071.336751] CPU: 1 PID: 17118 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3071.344651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3071.354006] Call Trace: [ 3071.356600] dump_stack+0x1fc/0x2ef [ 3071.360239] should_fail.cold+0xa/0xf [ 3071.364035] ? setup_fault_attr+0x200/0x200 [ 3071.368360] __alloc_pages_nodemask+0x239/0x2890 [ 3071.373104] ? kasan_kmalloc+0x139/0x160 [ 3071.377148] ? __kmalloc_node+0x4c/0x70 [ 3071.381116] ? blk_mq_alloc_rq_map+0x120/0x230 [ 3071.385688] ? blk_mq_init_sched+0x219/0x730 [ 3071.390087] ? elevator_init_mq+0xf0/0x180 [ 3071.394324] ? blk_mq_init_allocated_queue+0xe1f/0x1300 [ 3071.399699] ? blk_mq_init_queue+0x5c/0xa0 [ 3071.403927] ? loop_add+0x2cb/0x8a0 [ 3071.407540] ? ksys_ioctl+0x9b/0xc0 [ 3071.411160] ? __x64_sys_ioctl+0x6f/0xb0 [ 3071.415218] ? do_syscall_64+0xf9/0x620 [ 3071.419195] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3071.423769] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3071.428519] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3071.433355] ? cache_alloc_refill+0x1da/0x340 [ 3071.437852] ? cache_alloc_refill+0x95/0x340 [ 3071.442266] ? setup_fault_attr+0x200/0x200 [ 3071.446583] ? find_next_bit+0x105/0x130 [ 3071.450644] ? __cpu_to_node+0x7b/0xa0 [ 3071.454535] ? blk_mq_hw_queue_to_node+0xc1/0x100 [ 3071.459377] blk_mq_alloc_rqs+0x242/0x800 [ 3071.463536] ? blk_mq_alloc_rq_map+0xaa/0x230 [ 3071.468034] blk_mq_init_sched+0x26c/0x730 [ 3071.472258] elevator_init_mq+0xf0/0x180 [ 3071.476306] blk_mq_init_allocated_queue+0xe1f/0x1300 [ 3071.481505] blk_mq_init_queue+0x5c/0xa0 [ 3071.485559] loop_add+0x2cb/0x8a0 [ 3071.489021] loop_control_ioctl+0x16c/0x480 [ 3071.493336] ? loop_lookup+0x1d0/0x1d0 [ 3071.497219] ? rcu_nmi_exit+0xb3/0x180 [ 3071.501102] ? loop_lookup+0x1d0/0x1d0 [ 3071.504983] do_vfs_ioctl+0xcdb/0x12e0 [ 3071.508868] ? lock_downgrade+0x720/0x720 [ 3071.513009] ? ioctl_preallocate+0x200/0x200 [ 3071.517405] ? __fget+0x356/0x510 [ 3071.520859] ? do_dup2+0x450/0x450 [ 3071.524392] ? vfs_write+0x393/0x540 [ 3071.528100] ? fput+0x2b/0x190 [ 3071.531300] ksys_ioctl+0x9b/0xc0 [ 3071.534747] __x64_sys_ioctl+0x6f/0xb0 [ 3071.538634] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3071.543210] do_syscall_64+0xf9/0x620 [ 3071.546999] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3071.552191] RIP: 0033:0x7f47f0c06109 [ 3071.555896] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3071.574784] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3071.582491] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3071.589760] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3071.597020] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3071.604277] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3071.611529] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 04:08:03 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c44, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:08:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000fff00000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:08:03 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 43) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:08:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000002bd502000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3071.768105] EXT4-fs (loop3): Invalid log cluster size: 50331648 [ 3071.796546] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:08:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020021020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3071.865129] FAULT_INJECTION: forcing a failure. [ 3071.865129] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3071.886523] CPU: 0 PID: 17149 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3071.894421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3071.903768] Call Trace: [ 3071.906349] dump_stack+0x1fc/0x2ef [ 3071.909970] should_fail.cold+0xa/0xf [ 3071.913768] ? setup_fault_attr+0x200/0x200 [ 3071.918087] __alloc_pages_nodemask+0x239/0x2890 [ 3071.922829] ? kasan_kmalloc+0x139/0x160 [ 3071.926881] ? __kmalloc_node+0x4c/0x70 [ 3071.930843] ? blk_mq_alloc_rq_map+0x120/0x230 [ 3071.935416] ? ksys_ioctl+0x9b/0xc0 [ 3071.939030] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3071.943775] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3071.948346] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3071.953096] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3071.957929] ? rcu_nmi_exit+0xb3/0x180 [ 3071.961817] ? loop_init_request+0x20/0xb0 [ 3071.966042] ? check_memory_region+0xbf/0x170 [ 3071.970531] blk_mq_alloc_rqs+0x242/0x800 [ 3071.974677] blk_mq_init_sched+0x26c/0x730 [ 3071.978904] elevator_init_mq+0xf0/0x180 [ 3071.982955] blk_mq_init_allocated_queue+0xe1f/0x1300 [ 3071.988144] blk_mq_init_queue+0x5c/0xa0 [ 3071.992194] loop_add+0x2cb/0x8a0 [ 3071.995641] loop_control_ioctl+0x16c/0x480 [ 3071.999951] ? loop_lookup+0x1d0/0x1d0 [ 3072.003827] ? rcu_nmi_exit+0xb3/0x180 [ 3072.007705] ? retint_kernel+0x2d/0x2d [ 3072.011584] ? loop_lookup+0x1d0/0x1d0 [ 3072.015471] do_vfs_ioctl+0xcdb/0x12e0 [ 3072.019347] ? lock_downgrade+0x720/0x720 [ 3072.023478] ? preempt_count_sub+0x3b/0x150 [ 3072.027791] ? ioctl_preallocate+0x200/0x200 [ 3072.032192] ? __fget+0x356/0x510 [ 3072.035642] ? do_dup2+0x450/0x450 [ 3072.039169] ? vfs_write+0x393/0x540 [ 3072.042872] ? fput+0x2b/0x190 [ 3072.046055] ksys_ioctl+0x9b/0xc0 [ 3072.049497] __x64_sys_ioctl+0x6f/0xb0 [ 3072.053373] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3072.057944] do_syscall_64+0xf9/0x620 [ 3072.061736] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3072.066911] RIP: 0033:0x7f47f0c06109 [ 3072.070612] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3072.089496] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3072.097190] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3072.104443] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 04:08:03 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x42a40, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000000c0)={0x4, [0x2, 0xff, 0xf9, 0x9]}, &(0x7f0000000100)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) unshare(0x18010100) (async) unshare(0x10000) (async) unshare(0x80) (async, rerun: 32) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (rerun: 32) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async, rerun: 64) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async, rerun: 64) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) [ 3072.111697] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3072.118951] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3072.126205] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 04:08:03 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x42a40, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000000c0)={0x4, [0x2, 0xff, 0xf9, 0x9]}, &(0x7f0000000100)=0xc) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) unshare(0x18010100) (async) unshare(0x10000) (async) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async, rerun: 64) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (rerun: 64) 04:08:03 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 44) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:08:03 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c45, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:08:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000091cb02000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3072.370210] EXT4-fs (loop2): Invalid log block size: 4279173120 [ 3072.379274] EXT4-fs (loop3): Invalid log cluster size: 3171024896 [ 3072.415356] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:08:04 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c46, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:08:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020041020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3072.504616] FAULT_INJECTION: forcing a failure. [ 3072.504616] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3072.523225] CPU: 1 PID: 17197 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3072.531133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3072.540490] Call Trace: [ 3072.543078] dump_stack+0x1fc/0x2ef [ 3072.546714] should_fail.cold+0xa/0xf [ 3072.550514] ? setup_fault_attr+0x200/0x200 [ 3072.554822] ? depot_save_stack+0x122/0x410 [ 3072.559152] __alloc_pages_nodemask+0x239/0x2890 [ 3072.563904] ? kasan_kmalloc+0x139/0x160 [ 3072.567952] ? __kmalloc_node+0x4c/0x70 [ 3072.571913] ? blk_mq_alloc_rq_map+0x120/0x230 [ 3072.576481] ? blk_mq_init_sched+0x219/0x730 [ 3072.580886] ? elevator_init_mq+0xf0/0x180 [ 3072.585125] ? blk_mq_init_allocated_queue+0xe1f/0x1300 [ 3072.590488] ? blk_mq_init_queue+0x5c/0xa0 [ 3072.594708] ? loop_add+0x2cb/0x8a0 [ 3072.598330] ? ksys_ioctl+0x9b/0xc0 [ 3072.601955] ? __x64_sys_ioctl+0x6f/0xb0 [ 3072.606012] ? do_syscall_64+0xf9/0x620 [ 3072.609977] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3072.614810] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3072.619564] ? rcu_nmi_exit+0xb3/0x180 [ 3072.623446] ? should_fail+0x142/0x7b0 [ 3072.627329] ? setup_fault_attr+0x200/0x200 [ 3072.631649] ? find_next_bit+0x105/0x130 [ 3072.635709] ? __cpu_to_node+0x7b/0xa0 [ 3072.639604] ? blk_mq_hw_queue_to_node+0xc1/0x100 [ 3072.644444] blk_mq_alloc_rqs+0x242/0x800 [ 3072.648580] ? blk_mq_alloc_rq_map+0xaa/0x230 [ 3072.653060] blk_mq_init_sched+0x26c/0x730 [ 3072.657394] elevator_init_mq+0xf0/0x180 [ 3072.661452] blk_mq_init_allocated_queue+0xe1f/0x1300 [ 3072.666641] blk_mq_init_queue+0x5c/0xa0 [ 3072.670704] loop_add+0x2cb/0x8a0 [ 3072.674156] loop_control_ioctl+0x16c/0x480 [ 3072.678473] ? loop_lookup+0x1d0/0x1d0 [ 3072.682364] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3072.686938] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3072.691688] ? loop_lookup+0x1d0/0x1d0 [ 3072.695561] do_vfs_ioctl+0xcdb/0x12e0 [ 3072.699449] ? lock_downgrade+0x720/0x720 [ 3072.703592] ? ioctl_preallocate+0x200/0x200 [ 3072.707989] ? __fget+0x356/0x510 [ 3072.711425] ? do_dup2+0x450/0x450 [ 3072.714947] ? vfs_write+0x393/0x540 [ 3072.718662] ? fput+0x2b/0x190 [ 3072.721864] ksys_ioctl+0x9b/0xc0 [ 3072.725312] __x64_sys_ioctl+0x6f/0xb0 [ 3072.729182] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3072.733822] do_syscall_64+0xf9/0x620 [ 3072.737627] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3072.742809] RIP: 0033:0x7f47f0c06109 [ 3072.746514] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3072.765401] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3072.773095] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3072.780358] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3072.787619] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3072.794871] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3072.802154] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 04:08:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000002bd512000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:08:04 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c47, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:08:04 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 45) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3072.948444] EXT4-fs (loop2): Invalid log block size: 3415277568 04:08:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000092cb02000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:08:04 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='\x00') unshare(0x18010100) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) [ 3073.089495] EXT4-fs (loop2): Invalid log block size: 3415343104 [ 3073.096134] FAULT_INJECTION: forcing a failure. [ 3073.096134] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3073.109890] CPU: 0 PID: 17231 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3073.117777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3073.127113] Call Trace: [ 3073.129693] dump_stack+0x1fc/0x2ef [ 3073.133323] should_fail.cold+0xa/0xf [ 3073.137136] ? setup_fault_attr+0x200/0x200 [ 3073.141460] __alloc_pages_nodemask+0x239/0x2890 [ 3073.146218] ? kasan_kmalloc+0x139/0x160 [ 3073.150287] ? __kmalloc_node+0x4c/0x70 [ 3073.154269] ? blk_mq_alloc_rq_map+0x120/0x230 [ 3073.158860] ? mark_held_locks+0xa6/0xf0 [ 3073.162916] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3073.167754] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3073.172330] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3073.177069] ? rcu_nmi_exit+0xb3/0x180 [ 3073.180941] ? retint_kernel+0x2d/0x2d [ 3073.184821] blk_mq_alloc_rqs+0x242/0x800 [ 3073.188959] blk_mq_init_sched+0x26c/0x730 [ 3073.193198] elevator_init_mq+0xf0/0x180 [ 3073.197255] blk_mq_init_allocated_queue+0xe1f/0x1300 [ 3073.202432] blk_mq_init_queue+0x5c/0xa0 [ 3073.206490] loop_add+0x2cb/0x8a0 [ 3073.209941] loop_control_ioctl+0x16c/0x480 [ 3073.214256] ? loop_lookup+0x1d0/0x1d0 [ 3073.218142] ? ksys_write+0x241/0x2a0 [ 3073.221924] ? loop_lookup+0x1d0/0x1d0 [ 3073.225795] do_vfs_ioctl+0xcdb/0x12e0 [ 3073.229668] ? lock_downgrade+0x720/0x720 [ 3073.233802] ? check_preemption_disabled+0x41/0x280 [ 3073.238808] ? ioctl_preallocate+0x200/0x200 [ 3073.243200] ? __fget+0x356/0x510 [ 3073.246639] ? do_dup2+0x450/0x450 [ 3073.250162] ? rcu_nmi_exit+0xb3/0x180 [ 3073.254052] ksys_ioctl+0x9b/0xc0 [ 3073.257500] __x64_sys_ioctl+0x6f/0xb0 [ 3073.261380] do_syscall_64+0xf9/0x620 [ 3073.265182] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3073.270354] RIP: 0033:0x7f47f0c06109 04:08:04 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c48, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3073.274058] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3073.292962] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3073.300652] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3073.307903] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3073.315159] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3073.322419] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3073.329674] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 [ 3073.408428] EXT4-fs (loop3): Invalid log cluster size: 3171024896 [ 3073.410849] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:08:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020001420000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:08:05 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 46) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:08:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000093cb02000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:08:05 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c49, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:08:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000002bd522000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3073.632767] FAULT_INJECTION: forcing a failure. [ 3073.632767] name failslab, interval 1, probability 0, space 0, times 0 [ 3073.646701] CPU: 1 PID: 17261 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3073.654594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3073.663937] Call Trace: [ 3073.666528] dump_stack+0x1fc/0x2ef [ 3073.670167] should_fail.cold+0xa/0xf [ 3073.673953] ? setup_fault_attr+0x200/0x200 [ 3073.678266] ? lock_acquire+0x1ec/0x3c0 [ 3073.682258] __should_failslab+0x115/0x180 [ 3073.686479] should_failslab+0x5/0x10 [ 3073.690263] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 3073.695479] __alloc_disk_node+0x69/0x410 [ 3073.699623] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3073.704199] loop_add+0x39c/0x8a0 [ 3073.707639] loop_control_ioctl+0x16c/0x480 [ 3073.711949] ? loop_lookup+0x1d0/0x1d0 [ 3073.715827] ? loop_lookup+0x1d0/0x1d0 [ 3073.719709] do_vfs_ioctl+0xcdb/0x12e0 [ 3073.723592] ? lock_downgrade+0x720/0x720 [ 3073.727725] ? check_preemption_disabled+0x41/0x280 [ 3073.732726] ? ioctl_preallocate+0x200/0x200 [ 3073.737117] ? __fget+0x356/0x510 [ 3073.740565] ? do_dup2+0x450/0x450 [ 3073.744102] ? vfs_write+0x393/0x540 [ 3073.747833] ? fput+0x2b/0x190 [ 3073.751013] ksys_ioctl+0x9b/0xc0 [ 3073.754466] __x64_sys_ioctl+0x6f/0xb0 [ 3073.758360] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3073.762932] do_syscall_64+0xf9/0x620 [ 3073.766723] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3073.771900] RIP: 0033:0x7f47f0c06109 [ 3073.775609] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3073.794495] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3073.802186] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3073.809438] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3073.816688] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3073.823947] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3073.831210] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 04:08:05 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c4a, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:08:05 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='\x00') unshare(0x18010100) (async) unshare(0x10000) (async) unshare(0x80) (async) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) 04:08:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000002bd532000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3073.919685] EXT4-fs (loop3): Invalid log cluster size: 3171024896 [ 3073.927515] EXT4-fs (loop2): Invalid log block size: 3415408640 [ 3073.946912] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:08:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000094cb02000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) 04:08:05 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 47) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:08:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020002020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:08:05 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c4b, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:08:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000095cb02000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3074.158913] EXT4-fs (loop2): Invalid log block size: 3415474176 [ 3074.167565] EXT4-fs (loop3): Invalid log cluster size: 3171024896 [ 3074.187645] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:08:05 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c4c, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:08:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020002320000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:08:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000002bd542000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3074.292169] FAULT_INJECTION: forcing a failure. [ 3074.292169] name failslab, interval 1, probability 0, space 0, times 0 [ 3074.304121] CPU: 1 PID: 17311 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3074.312002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3074.321347] Call Trace: [ 3074.323930] dump_stack+0x1fc/0x2ef [ 3074.327554] should_fail.cold+0xa/0xf [ 3074.331354] ? setup_fault_attr+0x200/0x200 [ 3074.335668] ? lock_acquire+0x170/0x3c0 [ 3074.339630] __should_failslab+0x115/0x180 [ 3074.343850] should_failslab+0x5/0x10 [ 3074.347638] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 3074.352742] __alloc_disk_node+0x69/0x410 [ 3074.356888] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3074.361655] loop_add+0x39c/0x8a0 [ 3074.365110] loop_control_ioctl+0x16c/0x480 [ 3074.369431] ? loop_lookup+0x1d0/0x1d0 [ 3074.373327] ? rcu_nmi_exit+0xb3/0x180 [ 3074.377211] ? retint_kernel+0x2d/0x2d [ 3074.381098] ? loop_lookup+0x1d0/0x1d0 [ 3074.384972] do_vfs_ioctl+0xcdb/0x12e0 [ 3074.388856] ? lock_downgrade+0x720/0x720 [ 3074.393008] ? check_preemption_disabled+0x41/0x280 [ 3074.398018] ? ioctl_preallocate+0x200/0x200 [ 3074.402411] ? __fget+0x356/0x510 [ 3074.405852] ? do_dup2+0x450/0x450 [ 3074.409387] ? vfs_write+0x393/0x540 [ 3074.413105] ? fput+0x2b/0x190 [ 3074.416302] ksys_ioctl+0x9b/0xc0 [ 3074.419758] __x64_sys_ioctl+0x6f/0xb0 [ 3074.423635] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3074.428222] do_syscall_64+0xf9/0x620 [ 3074.432036] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3074.437233] RIP: 0033:0x7f47f0c06109 [ 3074.440941] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3074.459828] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3074.467521] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3074.474781] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3074.482052] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3074.489319] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3074.496584] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 04:08:06 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 48) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3074.570060] EXT4-fs (loop2): Invalid log block size: 3415539712 04:08:06 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c4d, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3074.670856] FAULT_INJECTION: forcing a failure. [ 3074.670856] name failslab, interval 1, probability 0, space 0, times 0 [ 3074.683165] CPU: 0 PID: 17332 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3074.683901] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3074.691054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3074.691060] Call Trace: [ 3074.691083] dump_stack+0x1fc/0x2ef [ 3074.691103] should_fail.cold+0xa/0xf [ 3074.691121] ? setup_fault_attr+0x200/0x200 [ 3074.691136] ? lock_acquire+0x170/0x3c0 [ 3074.691155] __should_failslab+0x115/0x180 [ 3074.731058] should_failslab+0x5/0x10 [ 3074.734847] kmem_cache_alloc_trace+0x284/0x380 [ 3074.739515] rand_initialize_disk+0x3b/0xc0 [ 3074.743821] __alloc_disk_node+0x234/0x410 [ 3074.748041] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3074.752613] loop_add+0x39c/0x8a0 [ 3074.756064] loop_control_ioctl+0x16c/0x480 [ 3074.760376] ? loop_lookup+0x1d0/0x1d0 [ 3074.764254] ? retint_kernel+0x2d/0x2d [ 3074.768125] ? loop_lookup+0x1d0/0x1d0 [ 3074.772008] do_vfs_ioctl+0xcdb/0x12e0 [ 3074.775883] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3074.780475] ? ioctl_preallocate+0x200/0x200 [ 3074.784882] ? rcu_nmi_exit+0xb3/0x180 [ 3074.788756] ? retint_kernel+0x2d/0x2d [ 3074.792631] ? security_file_ioctl+0x22/0xb0 [ 3074.797021] ? audit_kill_trees+0x230/0x230 [ 3074.801326] ksys_ioctl+0x9b/0xc0 [ 3074.804763] __x64_sys_ioctl+0x6f/0xb0 [ 3074.808645] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3074.813211] do_syscall_64+0xf9/0x620 [ 3074.816996] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3074.822166] RIP: 0033:0x7f47f0c06109 [ 3074.825861] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3074.844753] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3074.852459] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3074.859723] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 04:08:06 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='\x00') unshare(0x18010100) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='\x00') (async) unshare(0x18010100) (async) unshare(0x10000) (async) unshare(0x80) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) unshare(0x0) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) (async) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (async) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) (async) 04:08:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000096cb02000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012100)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x6400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001900000001000000010000001e00000002000000040000001a", 0xd5, 0x8d00}], 0x0, &(0x7f0000013800)) [ 3074.866980] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3074.874237] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3074.881493] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 04:08:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x61020000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020002d20000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000013800)) 04:08:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x91}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x18010100) unshare(0x10000) unshare(0x80) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xa) r1 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x3, 0x0, 0x4, 0xffffffffffffffff, 0x2, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x88502, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r1) 04:08:06 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c4e, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) 04:08:06 executing program 5: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) (fail_nth: 49) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(0xffffffffffffffff, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3075.071732] EXT4-fs (loop3): Invalid log cluster size: 3171024896 [ 3075.100335] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3075.131192] FAULT_INJECTION: forcing a failure. [ 3075.131192] name failslab, interval 1, probability 0, space 0, times 0 [ 3075.146737] CPU: 1 PID: 17375 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3075.154637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3075.163993] Call Trace: [ 3075.166579] dump_stack+0x1fc/0x2ef [ 3075.170207] should_fail.cold+0xa/0xf [ 3075.174010] ? setup_fault_attr+0x200/0x200 [ 3075.178340] ? lock_is_held_type+0x17a/0x210 [ 3075.182747] __should_failslab+0x115/0x180 [ 3075.186974] should_failslab+0x5/0x10 [ 3075.190769] kmem_cache_alloc_trace+0x284/0x380 [ 3075.195437] device_create_groups_vargs+0x8a/0x270 [ 3075.200362] device_create+0xdf/0x120 [ 3075.204159] ? device_create_vargs+0x50/0x50 [ 3075.208570] ? pointer+0x850/0x850 [ 3075.212109] bdi_register_va.part.0+0x4c/0x750 [ 3075.216677] bdi_register+0x12a/0x140 [ 3075.220476] ? bdi_register_va+0x80/0x80 [ 3075.224536] ? vsnprintf+0x2cc/0x14f0 [ 3075.228336] bdi_register_owner+0x59/0x100 [ 3075.232566] __device_add_disk+0xd58/0x10c0 [ 3075.236875] ? sprintf+0xc0/0x100 [ 3075.240323] ? blk_alloc_devt+0x2d0/0x2d0 [ 3075.244467] ? __raw_spin_lock_init+0x28/0x100 [ 3075.249044] ? __lockdep_init_map+0x100/0x5a0 [ 3075.253536] loop_add+0x628/0x8a0 [ 3075.256983] loop_control_ioctl+0x16c/0x480 [ 3075.261298] ? loop_lookup+0x1d0/0x1d0 [ 3075.265170] ? rcu_nmi_exit+0xb3/0x180 [ 3075.269053] ? retint_kernel+0x2d/0x2d [ 3075.272937] ? loop_lookup+0x1d0/0x1d0 [ 3075.276808] do_vfs_ioctl+0xcdb/0x12e0 [ 3075.280690] ? lock_downgrade+0x720/0x720 [ 3075.284841] ? check_preemption_disabled+0x41/0x280 [ 3075.289852] ? ioctl_preallocate+0x200/0x200 [ 3075.294253] ? __fget+0x356/0x510 [ 3075.297694] ? do_dup2+0x450/0x450 [ 3075.301216] ? vfs_write+0x393/0x540 [ 3075.304932] ? fput+0x2b/0x190 [ 3075.308136] ksys_ioctl+0x9b/0xc0 [ 3075.311593] __x64_sys_ioctl+0x6f/0xb0 [ 3075.315473] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3075.320050] do_syscall_64+0xf9/0x620 [ 3075.323864] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3075.329055] RIP: 0033:0x7f47f0c06109 [ 3075.332770] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3075.351666] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3075.359375] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3075.366640] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3075.373896] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 04:08:06 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x91}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) unshare(0x0) semop(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x10000) unshare(0x80) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x2080, 0x0) clock_gettime(0x0, &(0x7f0000000140)) unshare(0x0) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800003078, 0x410, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8}, 0x46024, 0x9b, 0x6e, 0x9, 0x4000000000, 0x7fc5d21f, 0x0, 0x0, 0x40, 0x0, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$LOOP_CTL_ADD(r1, 0x4c4f, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) unshare(0x2020000) lseek(r2, 0x1, 0x1) pselect6(0x40, &(0x7f0000001380)={0x0, 0x10002, 0x2, 0x0, 0x6, 0xffffffffffffffff, 0x2, 0x1}, &(0x7f0000000100)={0x8, 0x6, 0x4000, 0x6, 0x0, 0x5, 0x9, 0xc3}, 0x0, &(0x7f00000012c0)={0x0, 0x3938700}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x88200, 0x0) [ 3075.381153] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3075.388412] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 [ 3075.414623] ------------[ cut here ]------------ [ 3075.425541] WARNING: CPU: 1 PID: 17375 at block/genhd.c:719 __device_add_disk.cold+0x69/0x188 [ 3075.434204] Kernel panic - not syncing: panic_on_warn set ... [ 3075.434204] [ 3075.441574] CPU: 1 PID: 17375 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 3075.449452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3075.458805] Call Trace: [ 3075.461392] dump_stack+0x1fc/0x2ef [ 3075.465008] panic+0x26a/0x50e [ 3075.468201] ? __warn_printk+0xf3/0xf3 [ 3075.472101] ? __device_add_disk.cold+0x69/0x188 [ 3075.476865] ? __probe_kernel_read+0x130/0x1b0 [ 3075.481466] ? __warn.cold+0x5/0x5a [ 3075.485100] ? __device_add_disk.cold+0x69/0x188 [ 3075.489848] __warn.cold+0x20/0x5a [ 3075.493373] ? io_schedule_timeout+0x140/0x140 [ 3075.497936] ? __device_add_disk.cold+0x69/0x188 [ 3075.502783] report_bug+0x262/0x2b0 [ 3075.506412] do_error_trap+0x1d7/0x310 [ 3075.510291] ? math_error+0x310/0x310 [ 3075.514085] ? __irq_work_queue_local+0x101/0x160 [ 3075.518934] ? irq_work_queue+0x29/0x80 [ 3075.522920] ? error_entry+0x72/0xd0 [ 3075.527252] ? trace_hardirqs_off_caller+0x6e/0x210 [ 3075.532262] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3075.537088] invalid_op+0x14/0x20 [ 3075.540532] RIP: 0010:__device_add_disk.cold+0x69/0x188 [ 3075.545898] Code: 02 84 c0 74 08 3c 03 0f 8e a8 00 00 00 44 8b a5 f0 05 00 00 e9 67 ad 6a fb e8 05 45 66 f9 48 c7 c7 60 75 b2 88 e8 64 76 f7 ff <0f> 0b e9 8f b9 6a fb e8 ed 44 66 f9 48 c7 c7 60 75 b2 88 e8 4c 76 [ 3075.564793] RSP: 0018:ffff8880a5007b38 EFLAGS: 00010286 [ 3075.570138] RAX: 0000000000000024 RBX: 0000000000000001 RCX: 0000000000000000 [ 3075.577396] RDX: 0000000000040000 RSI: ffffffff814dff01 RDI: ffffed1014a00f59 [ 3075.584647] RBP: ffff8880abf63100 R08: 0000000000000024 R09: 0000000000000000 [ 3075.591898] R10: 0000000000000005 R11: 0000000000000000 R12: ffff8880abf63190 [ 3075.599154] R13: ffff8880abf63790 R14: 00000000fffffff4 R15: ffff8880abf63104 [ 3075.606438] ? vprintk_func+0x81/0x180 [ 3075.610323] ? __device_add_disk.cold+0x69/0x188 [ 3075.615061] ? sprintf+0xc0/0x100 [ 3075.618507] ? blk_alloc_devt+0x2d0/0x2d0 [ 3075.622659] ? __raw_spin_lock_init+0x28/0x100 [ 3075.627233] ? __lockdep_init_map+0x100/0x5a0 [ 3075.631717] loop_add+0x628/0x8a0 [ 3075.635157] loop_control_ioctl+0x16c/0x480 [ 3075.639477] ? loop_lookup+0x1d0/0x1d0 [ 3075.643363] ? rcu_nmi_exit+0xb3/0x180 [ 3075.647232] ? retint_kernel+0x2d/0x2d [ 3075.651104] ? loop_lookup+0x1d0/0x1d0 [ 3075.654972] do_vfs_ioctl+0xcdb/0x12e0 [ 3075.658854] ? lock_downgrade+0x720/0x720 [ 3075.663002] ? check_preemption_disabled+0x41/0x280 [ 3075.668021] ? ioctl_preallocate+0x200/0x200 [ 3075.672421] ? __fget+0x356/0x510 [ 3075.675856] ? do_dup2+0x450/0x450 [ 3075.679391] ? vfs_write+0x393/0x540 [ 3075.683107] ? fput+0x2b/0x190 [ 3075.686290] ksys_ioctl+0x9b/0xc0 [ 3075.689743] __x64_sys_ioctl+0x6f/0xb0 [ 3075.693624] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3075.698199] do_syscall_64+0xf9/0x620 [ 3075.702007] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3075.707184] RIP: 0033:0x7f47f0c06109 [ 3075.710889] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3075.729781] RSP: 002b:00007f47ef57b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3075.737484] RAX: ffffffffffffffda RBX: 00007f47f0d18f60 RCX: 00007f47f0c06109 [ 3075.744745] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 3075.752004] RBP: 00007f47ef57b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3075.759268] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3075.766532] R13: 00007ffd94a843df R14: 00007f47ef57b300 R15: 0000000000022000 [ 3075.774266] Kernel Offset: disabled [ 3075.778041] Rebooting in 86400 seconds..