[ OK ] Started Getty on tty2. [ OK ] Started Serial Getty on ttyS0. [ OK ] Started Getty on tty1. [ OK ] Started System Logging Service. [ OK ] Started getty on tty2-tty6 if dbus and logind are not available. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.10.18' (ECDSA) to the list of known hosts. 2020/11/05 12:44:34 fuzzer started 2020/11/05 12:44:36 dialing manager at 10.128.0.26:40321 2020/11/05 12:44:36 syscalls: 3433 2020/11/05 12:44:36 code coverage: enabled 2020/11/05 12:44:36 comparison tracing: enabled 2020/11/05 12:44:36 extra coverage: enabled 2020/11/05 12:44:36 setuid sandbox: enabled 2020/11/05 12:44:36 namespace sandbox: enabled 2020/11/05 12:44:36 Android sandbox: /sys/fs/selinux/policy does not exist 2020/11/05 12:44:36 fault injection: enabled 2020/11/05 12:44:36 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/11/05 12:44:36 net packet injection: enabled 2020/11/05 12:44:36 net device setup: enabled 2020/11/05 12:44:36 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/11/05 12:44:36 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/11/05 12:44:36 USB emulation: enabled 2020/11/05 12:44:36 hci packet injection: enabled 2020/11/05 12:44:36 wifi device emulation: enabled 12:47:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x10, 0x0, 0x0) syzkaller login: [ 345.714410][ T8266] IPVS: ftp: loaded support on port[0] = 21 [ 346.274403][ T8266] chnl_net:caif_netlink_parms(): no params data found [ 346.429771][ T8266] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.437281][ T8266] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.447755][ T8266] device bridge_slave_0 entered promiscuous mode [ 346.461218][ T8266] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.468453][ T8266] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.478003][ T8266] device bridge_slave_1 entered promiscuous mode [ 346.525495][ T8266] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 346.542258][ T8266] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 346.592806][ T8266] team0: Port device team_slave_0 added [ 346.605741][ T8266] team0: Port device team_slave_1 added [ 346.648629][ T8266] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 346.655959][ T8266] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 346.682635][ T8266] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 346.699199][ T8266] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 346.706511][ T8266] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 346.732766][ T8266] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 346.798184][ T8266] device hsr_slave_0 entered promiscuous mode [ 346.806811][ T8266] device hsr_slave_1 entered promiscuous mode [ 347.086445][ T8266] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 347.103906][ T8266] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 347.130196][ T8266] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 347.191465][ T8266] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 347.496300][ T8266] 8021q: adding VLAN 0 to HW filter on device bond0 [ 347.533273][ T3125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 347.542399][ T3125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 347.568635][ T8266] 8021q: adding VLAN 0 to HW filter on device team0 [ 347.594554][ T3125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 347.605323][ T3125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 347.614779][ T3125] bridge0: port 1(bridge_slave_0) entered blocking state [ 347.622246][ T3125] bridge0: port 1(bridge_slave_0) entered forwarding state [ 347.691731][ T3125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 347.701041][ T3125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 347.711137][ T3125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 347.720421][ T3125] bridge0: port 2(bridge_slave_1) entered blocking state [ 347.727748][ T3125] bridge0: port 2(bridge_slave_1) entered forwarding state [ 347.736903][ T3125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 347.747834][ T3125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 347.758874][ T3125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 347.769247][ T3125] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 347.800856][ T3125] Bluetooth: hci0: command 0x0409 tx timeout [ 347.807653][ T3125] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 347.817497][ T3125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 347.828168][ T3125] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 347.849929][ T3125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 347.860117][ T3125] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 347.895820][ T8266] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 347.909053][ T8266] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 347.918765][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 347.928586][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 348.006739][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 348.015092][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 348.052559][ T8266] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 348.116335][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 348.126466][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 348.184145][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 348.193992][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 348.216546][ T8266] device veth0_vlan entered promiscuous mode [ 348.233067][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 348.243067][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 348.267475][ T8266] device veth1_vlan entered promiscuous mode [ 348.341802][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 348.352129][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 348.361660][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 348.371596][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 348.393257][ T8266] device veth0_macvtap entered promiscuous mode [ 348.413116][ T8266] device veth1_macvtap entered promiscuous mode [ 348.468764][ T8266] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 348.476970][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 348.486533][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 348.496062][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 348.506181][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 348.530494][ T8266] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 348.542920][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 348.553261][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 348.572228][ T8266] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 348.581199][ T8266] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 348.590026][ T8266] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 348.599732][ T8266] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 348.922203][ T1421] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 348.930117][ T1421] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 348.939747][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 348.987717][ T8490] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 348.995945][ T8490] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 349.008341][ T746] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 12:47:56 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff}) fcntl$getown(r0, 0x5) 12:47:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f00000008c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 12:47:57 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x30a28, 0x0) [ 349.876051][ T30] Bluetooth: hci0: command 0x041b tx timeout 12:47:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) 12:47:57 executing program 0: munmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000) munmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000) 12:47:57 executing program 0: bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0xac, r0, 0x219, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x5c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100000000}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xb6f}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xc1}]}, @TIPC_NLA_NET={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x400}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}]}, @TIPC_NLA_NET={0x18, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}]}]}, 0xac}}, 0x4085) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000000), 0x4) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x8, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) [ 350.636433][ T8526] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:47:58 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', &(0x7f00000000c0)={0xc1041, 0x19, 0x10}, 0x18) readv(r0, &(0x7f0000002740)=[{&(0x7f0000000140)=""/36, 0x24}, {&(0x7f0000000180)=""/189, 0xbd}, {&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/160, 0xa0}, {&(0x7f0000001300)=""/164, 0xa4}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f00000023c0)=""/186, 0xba}, {&(0x7f0000002480)=""/145, 0x91}, {&(0x7f0000002540)=""/107, 0x6b}, {&(0x7f00000025c0)=""/131, 0x83}, {&(0x7f0000002700)=""/31, 0x1f}], 0xb) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, r2, 0x0, 0x7ffd, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x2, 0x4) syz_mount_image$squashfs(&(0x7f0000000080)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x8, &(0x7f0000002d40)=[{&(0x7f0000002dc0)="ecd6c702658544b3df461fed21e208cb341d2598fba07082d36b97430500"/42, 0x2a, 0x9}, {&(0x7f00000027c0)="89980f84542edbd670361a1aad98d941bd6c033697712e0483a2b92824dcb132563abe6013ec7590146633b1fa4f57d80697eb94745df183ae2f196cf33f5d19608012bebd8a179550aef50a1138b7f5f1fbb00452a35df8f71e04d9c2450a7b8ef4cce880d0f777e82a95ae703ac5cfda86a5017851d93e7af0c407ab3779b6d9dab817d738355e6a84f3279101aaaebc2831f6b9d92af1c5a27f70a8372a83a3c10324a0cb1f944641696758b18f55d40e8965a3a6db0fbcbaa9ab26", 0xbd, 0x2}, {&(0x7f0000002880)="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", 0xff, 0x9}, {&(0x7f0000002980)="d320f789ef91d21d246a231864c2ce9ca9b3b00ea80bb91579ef78e4b57310a40a2e721b666fb2e2d28bb92d0e3f8b586cdd7568f55b73726ee03549462345d0f420dc31341023f60578e83f6fc7a2e896834a19ba8c44a4a311708644bf9844d53f3545e278b3f0dbf2f08ff4d96e6273b7977e48971dacdd0c08a14bd5d4a112cac24cf98d58d19bf88dd625", 0x8d, 0x1}, {&(0x7f0000002a40)="ba47eb8050bbf2261c9d0bc71a9a7632118296f2dbed2351431fa0e3057cbdcf9d10c1c007c509f5cc41fe38836039405c3bfbad5ec828f9cde0fffa4439ea4c1ca8181535f80b17a7da0ccc123239e5c3ebb4b4b7ede38c19f70bcee48e4b331317ff38b2dc9af2e45c529a95f3b82402de4144cd85dff8b6bb93e9947e587140c96b8b35fba25876cf47c1c33ab55bbd6434eb0b32c8a3d67a169014b3659c9e0931b6077257d8c25580f4c0c48f05bec969fcd81187105803ddee7c1a84b2972b5ccff551e854470e880a93659d281a587c47", 0xd4, 0x3}, {&(0x7f0000002b40)="0f4548724ff6fe77e2fc58b8d61386d0b36786de81af37302248a6e285353c0124f09cf211a70527c9ab76542bd221152c768fd565a165b98e655975298f759b83f9f9f7aa3222d5e6d7f1c20f07c1c3ea29e6ab9d8a815cb8cd73f3b931b3a922cec05f16e062ca1b6a", 0x6a, 0xfff}, {&(0x7f0000002bc0)="36a89f8c747eda803e38ec54daf9aa6b02fe0fb2900b66da2b7f8a43d463af03f905b914bdb2553317c78ae82db8837e77ed88c4a8940fd5ce11c89893d9948380a008423fa70c340c2db64dd667c2f108af14c118cf2a3a52c98f9f85e2963d4aeea70bd38c7f02dfca00c73b03731ff793bf5d95768bf789c8b37e90b00f73a474436a48803919694d1715aa31be44744534d46df537d58e6fca5e86743db763d8bfa9e0496eb6", 0xa8}, {&(0x7f0000002c80)="ddeed4dc22a99e027eef29a97b0df545cdce2722cafc2c4193b5c4f3750aacb0c0a88ff2e50a5ca0d6e0b9e928b971c22e3ed923e513b1d9c881b6e8752436a2c165f435a82e39c4d6153f8e0655bbec910d59a338336613f788fc101d254c89317cf1ef8b0cc439cca65bd6f71bf493209e1480a5a46bf8892c6e9f2b26dae06dd296157ad5c4785e29e3088920b019bd", 0x91, 0x3ff}], 0x0, &(0x7f0000000540)=ANY=[]) [ 350.980381][ T8564] Can't find a SQUASHFS superblock on loop0 12:47:58 executing program 0: clone(0x889e0a2c86e91afd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @ptr, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/200, 0x4a, 0xc8, 0x8}, 0x20) [ 351.338033][ T8571] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=0 [ 351.345051][ T8571] BPF: [ 351.347888][ T8571] BPF:Member exceeds struct_size [ 351.353164][ T8571] BPF: [ 351.353164][ T8571] 12:47:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB="380000002400ffffff7f00000000400000000000", @ANYRES32=r2, @ANYBLOB="0000b300ffffff8942f6d2000900010068ff010000000000000002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000005c0)=ANY=[@ANYBLOB="900000002c00270d00"/20, @ANYRES32=r2, @ANYBLOB="f7ff0000000000000e00000007000100667700f65b00020058000400540001000b00010073696d706c650000280002800c0003007463696e64657800180002000000000000000000000000000300000000000000040006000c00070000000000000000000c00080000000000000000000600050040000000"], 0x90}}, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000200), 0x10efe10675dec16, 0x0) [ 351.589374][ T8574] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 351.603009][ T8574] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 351.617674][ T8575] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 351.633156][ T8575] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:47:58 executing program 0: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0x800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000040)="eb3d90", 0x3}], 0x0, &(0x7f0000000340)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) keyctl$chown(0x4, 0x0, r1, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x30, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000080)=@IORING_OP_READ_FIXED={0x4, 0x3, 0x4004, @fd_index=0x1, 0x8, 0x1ff, 0x6, 0x1}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r4, 0x0, 0x12) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB="2c79e6ace58af8303dce28f726649d726f0900000000000000303030303030303030303030303030303734303030302c757365725f69643db2321987c09aaea43cdce26b6e62df3102b26c0504aec453aba07fea872cf0902bf2730600fc", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r5, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r7}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r7, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r7, &(0x7f0000004200)={0x50, 0x0, r8}, 0x50) write$FUSE_INIT(r5, &(0x7f0000004200)={0x50, 0x0, r8, {0x7, 0x1f, 0x0, 0x80110}}, 0x50) write$FUSE_CREATE_OPEN(r4, &(0x7f00000000c0)={0xa0, 0x24, r6, {{0x5, 0x0, 0x0, 0x7, 0x2, 0x80000000, {0x1, 0x7f, 0x3f, 0x2, 0x5ac, 0x100000000, 0x8, 0x1, 0x51, 0x4000, 0x80, r1, r2, 0x800, 0x1f}}}}, 0xa0) [ 351.903611][ T8578] FAT-fs (loop0): bogus number of reserved sectors [ 351.910322][ T8578] FAT-fs (loop0): This looks like a DOS 1.x volume, but isn't a recognized floppy size (4 sectors) [ 351.921405][ T8578] FAT-fs (loop0): Can't find a valid FAT filesystem [ 351.952700][ T8486] Bluetooth: hci0: command 0x040f tx timeout [ 352.028470][ T8578] FAT-fs (loop0): bogus number of reserved sectors [ 352.035568][ T8578] FAT-fs (loop0): This looks like a DOS 1.x volume, but isn't a recognized floppy size (4 sectors) [ 352.046533][ T8578] FAT-fs (loop0): Can't find a valid FAT filesystem [ 352.124312][ T8584] fuse: Bad value for 'fd' 12:47:59 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000100)=@xdp={0x2c, 0x0, 0x0, 0x23}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000340)="eb2f21460f123d067d504ddb0344130e9ea793a1637e47df5ed04c5c5beffc223c05790f2a17917ac55d50fb44ef7a4397a30d884e55bcedaa8afd429d93622d2a6b772f92973d4e2929aec995f6d4d8d379712ae6099f1b54db44fa6c6ecf1365338729604eeef1e2afa9b32c26ff60f4bf3d0b46fcd80964bc9e08ac804436253c1da741597696a5f29829f0716e973c192a870b6f8a18b037dffe9571a2011db7b16d5e4893d39be99938ff3a808999", 0xb1}, {&(0x7f0000000400)="89eb9f3270fad4d1fada009008e12360f8a6d9364e052f67c20c576ad470753d548a5251b9ec1fe207b2420b23da96f1f3d062cb7aaf4eeeb66448cf32eaa82559ef723ed1493fbf61e14d687873607348997e7649c7000fe405a9800409229316c46ae902128107d59fc0e26573ebf38feab14d522365c41e88faab88a7ff681e6d1d02ee061bf70bdd2203663399fb186e2513413534c988ffdacfb04fb464aa66e22e0e9506321aabe30ee09bdfad3d0386271a78c9dfd7d671094fb219552d7065539de5c7c562e1fd9b57ee9db8c20e530ac153cb5a6a199f969dd606e69e098ecf3a4f6ece1555957412cf7ad9", 0xf0}, {&(0x7f0000000500)="a51edf5d9b1be434141032d153b51f4a66ce815dacd0ae62149eb6186181907b44e3a89883204d0c5163a5831f5140fb78100c0bee951b863d16bafa6d6d91597b48e051bc85636cb6805642eb8c26f50c092ce2677576", 0x57}, {&(0x7f0000000580)="6ec78b91c852516fd3fbacc5659012bc2314e05dd0c66f0674b9734fcd019f318427a5f792e0fbb75a10b56d2fd5d2e83bbeaa5e7ff6559cbff4ac3f743e0f855e2a6d560f50ec78851ead7e42780cdb02919968ad3cd7607a8527757fb1c5fed196c376e86d607e5c700a772eb981b5733d422c", 0x74}, {&(0x7f0000000600)="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", 0x1000}, {&(0x7f0000000180)="3226a8aa0429de53bd9a4c942b5fb74e344bf7d8c9c93805dd37d0470157b55429155cfe3163", 0x26}], 0x6, &(0x7f0000001640)=[{0xf8, 0x3a, 0x1, "64c82bbfa08d3fc23b13f656679c667c3eb00134f4e7c55c3d8581b6683a273d562c9d9cc082335fbae683a078e89bf2d16bf2c81cd2dc1290d9110c1fb757dca8ebf630d14ee723c7376915b46ad4fc1d0b89a777564ced89261dcf86c7dc5277b72b1439d5af7e11d5ca8a7676d41a9f4c179b121bde2a943ecddf3834d65430b290213218c0ead463c98cf68fc2a9d1fba0413a3f6477ee63b64e29d6c341291d0b6324e0cd5389e86ac760e74d4d5784b509065c2cbb8c68b460fe72be9add043217402b316cc3fbd20635557faaed88d5651f6801274004eafb95ace1aabb1282410076b49d7862"}, {0xc4, 0x119, 0x0, "ad5cf8b462aeb210c8cee38e0d3c6b9dd5da113885b7bfbd97c78affcb687dd15c1587ef7f04e224367d7692e4a9d22051bd0fcf9ec02222b5f60980d7edaea445f72308b02cc9702a48d13b27dc2ea201c7bb79ab371a03706fdf4115f501aebeab4aa1b0f6b025c422212a8d99c786d271524d159f04fb0a86903f09484ae9cea4eeea041eb52209084a408e0c1494d62f81265bc9aeb05fb24dbccc3a10ddaf32afac099c1d24af99223440c64b9971221c20d2f2"}, {0xcc, 0x10e, 0x1, "26c00e6a8c74c1eb9c0dfc4ca16ba42c132b78ad29c1c0ee168bde9b4302113c9d65c684df9f53d14c4af2b710742db40fbe049338f09f77396e504d02d7fd96663f6bc64c94b67f73f4464598bfa597416a36d25e8a9250ac34a06029473a206c763ae50ff1819a8fbdfab0a7766da7b0afd2223c133041db84b1c289bc739c58569b469fe5c17ad7091f1fdcd61e1276eecab0a05bee13b1cdc9c41262c6926a2c865c06eafa551666c547dd7c713f5fc0e03e897652eeab46d98a65b5"}, {0xcc, 0x118, 0x8, "e18d270827a53a1b55c16c0bbce13145fb1a1569f7e6e9bd80cd5f527443ed76e7c8c80226a1372ee938da2603558aa74bcc68a9fb1d18c2509d3755f6827122f51dcfd566bb9a2b0a3e5b21866b9f562a6aec358178c0d5dea34caac5eaab9451e018d42a05abe2383ea700c34416423502991c8dd3b557d21b2128740644295fa436b0354f24541a1c497122785042e7285545b8565a829b748177fe90f6564b7e3bd6b5a8f128a841dc594d1018c29f79b98f5d892128ba32f0d298f0b1"}], 0x354}, 0x80) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r2, 0xc0385720, &(0x7f0000001d40)={0x1}) splice(r1, 0x0, r3, 0x0, 0x7ffd, 0x0) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000001a40)='devlink\x00') sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r1, &(0x7f0000001d00)={&(0x7f0000001a00)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000001cc0)={&(0x7f0000001a80)={0x240, r4, 0x400, 0x70bd25, 0x25dfdbff, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x3f}, {0x6}, {0x8, 0x15, 0x9}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x5}, {0x6, 0x11, 0xfff8}, {0x8, 0x15, 0xfffffffe}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x11, 0x4000}, {0x8, 0x15, 0x4}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x9}, {0x6, 0x11, 0x1}, {0x8, 0x15, 0xfef}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x7}, {0x6, 0x11, 0x9}, {0x8, 0x15, 0xbbd}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x40}, {0x6, 0x11, 0x3f}, {0x8, 0x15, 0x1ff}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x4}, {0x6, 0x11, 0x8}, {0x8, 0x15, 0x9}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6}, {0x8, 0x15, 0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8, 0xb, 0x9}, {0x6, 0x11, 0x1}, {0x8, 0x15, 0x8001}}]}, 0x240}, 0x1, 0x0, 0x0, 0x24000804}, 0x50) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:47:59 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000100)=@xdp={0x2c, 0x0, 0x0, 0x23}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000340)="eb2f21460f123d067d504ddb0344130e9ea793a1637e47df5ed04c5c5beffc223c05790f2a17917ac55d50fb44ef7a4397a30d884e55bcedaa8afd429d93622d2a6b772f92973d4e2929aec995f6d4d8d379712ae6099f1b54db44fa6c6ecf1365338729604eeef1e2afa9b32c26ff60f4bf3d0b46fcd80964bc9e08ac804436253c1da741597696a5f29829f0716e973c192a870b6f8a18b037dffe9571a2011db7b16d5e4893d39be99938ff3a808999", 0xb1}, {&(0x7f0000000400)="89eb9f3270fad4d1fada009008e12360f8a6d9364e052f67c20c576ad470753d548a5251b9ec1fe207b2420b23da96f1f3d062cb7aaf4eeeb66448cf32eaa82559ef723ed1493fbf61e14d687873607348997e7649c7000fe405a9800409229316c46ae902128107d59fc0e26573ebf38feab14d522365c41e88faab88a7ff681e6d1d02ee061bf70bdd2203663399fb186e2513413534c988ffdacfb04fb464aa66e22e0e9506321aabe30ee09bdfad3d0386271a78c9dfd7d671094fb219552d7065539de5c7c562e1fd9b57ee9db8c20e530ac153cb5a6a199f969dd606e69e098ecf3a4f6ece1555957412cf7ad9", 0xf0}, {&(0x7f0000000500)="a51edf5d9b1be434141032d153b51f4a66ce815dacd0ae62149eb6186181907b44e3a89883204d0c5163a5831f5140fb78100c0bee951b863d16bafa6d6d91597b48e051bc85636cb6805642eb8c26f50c092ce2677576", 0x57}, {&(0x7f0000000580)="6ec78b91c852516fd3fbacc5659012bc2314e05dd0c66f0674b9734fcd019f318427a5f792e0fbb75a10b56d2fd5d2e83bbeaa5e7ff6559cbff4ac3f743e0f855e2a6d560f50ec78851ead7e42780cdb02919968ad3cd7607a8527757fb1c5fed196c376e86d607e5c700a772eb981b5733d422c", 0x74}, {&(0x7f0000000600)="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", 0x1000}, {&(0x7f0000000180)="3226a8aa0429de53bd9a4c942b5fb74e344bf7d8c9c93805dd37d0470157b55429155cfe3163", 0x26}], 0x6, &(0x7f0000001640)=[{0xf8, 0x3a, 0x1, "64c82bbfa08d3fc23b13f656679c667c3eb00134f4e7c55c3d8581b6683a273d562c9d9cc082335fbae683a078e89bf2d16bf2c81cd2dc1290d9110c1fb757dca8ebf630d14ee723c7376915b46ad4fc1d0b89a777564ced89261dcf86c7dc5277b72b1439d5af7e11d5ca8a7676d41a9f4c179b121bde2a943ecddf3834d65430b290213218c0ead463c98cf68fc2a9d1fba0413a3f6477ee63b64e29d6c341291d0b6324e0cd5389e86ac760e74d4d5784b509065c2cbb8c68b460fe72be9add043217402b316cc3fbd20635557faaed88d5651f6801274004eafb95ace1aabb1282410076b49d7862"}, {0xc4, 0x119, 0x0, "ad5cf8b462aeb210c8cee38e0d3c6b9dd5da113885b7bfbd97c78affcb687dd15c1587ef7f04e224367d7692e4a9d22051bd0fcf9ec02222b5f60980d7edaea445f72308b02cc9702a48d13b27dc2ea201c7bb79ab371a03706fdf4115f501aebeab4aa1b0f6b025c422212a8d99c786d271524d159f04fb0a86903f09484ae9cea4eeea041eb52209084a408e0c1494d62f81265bc9aeb05fb24dbccc3a10ddaf32afac099c1d24af99223440c64b9971221c20d2f2"}, {0xcc, 0x10e, 0x1, "26c00e6a8c74c1eb9c0dfc4ca16ba42c132b78ad29c1c0ee168bde9b4302113c9d65c684df9f53d14c4af2b710742db40fbe049338f09f77396e504d02d7fd96663f6bc64c94b67f73f4464598bfa597416a36d25e8a9250ac34a06029473a206c763ae50ff1819a8fbdfab0a7766da7b0afd2223c133041db84b1c289bc739c58569b469fe5c17ad7091f1fdcd61e1276eecab0a05bee13b1cdc9c41262c6926a2c865c06eafa551666c547dd7c713f5fc0e03e897652eeab46d98a65b5"}, {0xcc, 0x118, 0x8, "e18d270827a53a1b55c16c0bbce13145fb1a1569f7e6e9bd80cd5f527443ed76e7c8c80226a1372ee938da2603558aa74bcc68a9fb1d18c2509d3755f6827122f51dcfd566bb9a2b0a3e5b21866b9f562a6aec358178c0d5dea34caac5eaab9451e018d42a05abe2383ea700c34416423502991c8dd3b557d21b2128740644295fa436b0354f24541a1c497122785042e7285545b8565a829b748177fe90f6564b7e3bd6b5a8f128a841dc594d1018c29f79b98f5d892128ba32f0d298f0b1"}], 0x354}, 0x80) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r2, 0xc0385720, &(0x7f0000001d40)={0x1}) splice(r1, 0x0, r3, 0x0, 0x7ffd, 0x0) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000001a40)='devlink\x00') sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r1, &(0x7f0000001d00)={&(0x7f0000001a00)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000001cc0)={&(0x7f0000001a80)={0x240, r4, 0x400, 0x70bd25, 0x25dfdbff, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x3f}, {0x6}, {0x8, 0x15, 0x9}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x5}, {0x6, 0x11, 0xfff8}, {0x8, 0x15, 0xfffffffe}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x11, 0x4000}, {0x8, 0x15, 0x4}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x9}, {0x6, 0x11, 0x1}, {0x8, 0x15, 0xfef}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x7}, {0x6, 0x11, 0x9}, {0x8, 0x15, 0xbbd}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x40}, {0x6, 0x11, 0x3f}, {0x8, 0x15, 0x1ff}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x4}, {0x6, 0x11, 0x8}, {0x8, 0x15, 0x9}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6}, {0x8, 0x15, 0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8, 0xb, 0x9}, {0x6, 0x11, 0x1}, {0x8, 0x15, 0x8001}}]}, 0x240}, 0x1, 0x0, 0x0, 0x24000804}, 0x50) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:47:59 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000100)=@xdp={0x2c, 0x0, 0x0, 0x23}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000340)="eb2f21460f123d067d504ddb0344130e9ea793a1637e47df5ed04c5c5beffc223c05790f2a17917ac55d50fb44ef7a4397a30d884e55bcedaa8afd429d93622d2a6b772f92973d4e2929aec995f6d4d8d379712ae6099f1b54db44fa6c6ecf1365338729604eeef1e2afa9b32c26ff60f4bf3d0b46fcd80964bc9e08ac804436253c1da741597696a5f29829f0716e973c192a870b6f8a18b037dffe9571a2011db7b16d5e4893d39be99938ff3a808999", 0xb1}, {&(0x7f0000000400)="89eb9f3270fad4d1fada009008e12360f8a6d9364e052f67c20c576ad470753d548a5251b9ec1fe207b2420b23da96f1f3d062cb7aaf4eeeb66448cf32eaa82559ef723ed1493fbf61e14d687873607348997e7649c7000fe405a9800409229316c46ae902128107d59fc0e26573ebf38feab14d522365c41e88faab88a7ff681e6d1d02ee061bf70bdd2203663399fb186e2513413534c988ffdacfb04fb464aa66e22e0e9506321aabe30ee09bdfad3d0386271a78c9dfd7d671094fb219552d7065539de5c7c562e1fd9b57ee9db8c20e530ac153cb5a6a199f969dd606e69e098ecf3a4f6ece1555957412cf7ad9", 0xf0}, {&(0x7f0000000500)="a51edf5d9b1be434141032d153b51f4a66ce815dacd0ae62149eb6186181907b44e3a89883204d0c5163a5831f5140fb78100c0bee951b863d16bafa6d6d91597b48e051bc85636cb6805642eb8c26f50c092ce2677576", 0x57}, {&(0x7f0000000580)="6ec78b91c852516fd3fbacc5659012bc2314e05dd0c66f0674b9734fcd019f318427a5f792e0fbb75a10b56d2fd5d2e83bbeaa5e7ff6559cbff4ac3f743e0f855e2a6d560f50ec78851ead7e42780cdb02919968ad3cd7607a8527757fb1c5fed196c376e86d607e5c700a772eb981b5733d422c", 0x74}, {&(0x7f0000000600)="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", 0x1000}, {&(0x7f0000000180)="3226a8aa0429de53bd9a4c942b5fb74e344bf7d8c9c93805dd37d0470157b55429155cfe3163", 0x26}], 0x6, &(0x7f0000001640)=[{0xf8, 0x3a, 0x1, "64c82bbfa08d3fc23b13f656679c667c3eb00134f4e7c55c3d8581b6683a273d562c9d9cc082335fbae683a078e89bf2d16bf2c81cd2dc1290d9110c1fb757dca8ebf630d14ee723c7376915b46ad4fc1d0b89a777564ced89261dcf86c7dc5277b72b1439d5af7e11d5ca8a7676d41a9f4c179b121bde2a943ecddf3834d65430b290213218c0ead463c98cf68fc2a9d1fba0413a3f6477ee63b64e29d6c341291d0b6324e0cd5389e86ac760e74d4d5784b509065c2cbb8c68b460fe72be9add043217402b316cc3fbd20635557faaed88d5651f6801274004eafb95ace1aabb1282410076b49d7862"}, {0xc4, 0x119, 0x0, "ad5cf8b462aeb210c8cee38e0d3c6b9dd5da113885b7bfbd97c78affcb687dd15c1587ef7f04e224367d7692e4a9d22051bd0fcf9ec02222b5f60980d7edaea445f72308b02cc9702a48d13b27dc2ea201c7bb79ab371a03706fdf4115f501aebeab4aa1b0f6b025c422212a8d99c786d271524d159f04fb0a86903f09484ae9cea4eeea041eb52209084a408e0c1494d62f81265bc9aeb05fb24dbccc3a10ddaf32afac099c1d24af99223440c64b9971221c20d2f2"}, {0xcc, 0x10e, 0x1, "26c00e6a8c74c1eb9c0dfc4ca16ba42c132b78ad29c1c0ee168bde9b4302113c9d65c684df9f53d14c4af2b710742db40fbe049338f09f77396e504d02d7fd96663f6bc64c94b67f73f4464598bfa597416a36d25e8a9250ac34a06029473a206c763ae50ff1819a8fbdfab0a7766da7b0afd2223c133041db84b1c289bc739c58569b469fe5c17ad7091f1fdcd61e1276eecab0a05bee13b1cdc9c41262c6926a2c865c06eafa551666c547dd7c713f5fc0e03e897652eeab46d98a65b5"}, {0xcc, 0x118, 0x8, "e18d270827a53a1b55c16c0bbce13145fb1a1569f7e6e9bd80cd5f527443ed76e7c8c80226a1372ee938da2603558aa74bcc68a9fb1d18c2509d3755f6827122f51dcfd566bb9a2b0a3e5b21866b9f562a6aec358178c0d5dea34caac5eaab9451e018d42a05abe2383ea700c34416423502991c8dd3b557d21b2128740644295fa436b0354f24541a1c497122785042e7285545b8565a829b748177fe90f6564b7e3bd6b5a8f128a841dc594d1018c29f79b98f5d892128ba32f0d298f0b1"}], 0x354}, 0x80) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r2, 0xc0385720, &(0x7f0000001d40)={0x1}) splice(r1, 0x0, r3, 0x0, 0x7ffd, 0x0) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000001a40)='devlink\x00') sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r1, &(0x7f0000001d00)={&(0x7f0000001a00)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000001cc0)={&(0x7f0000001a80)={0x240, r4, 0x400, 0x70bd25, 0x25dfdbff, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x3f}, {0x6}, {0x8, 0x15, 0x9}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x5}, {0x6, 0x11, 0xfff8}, {0x8, 0x15, 0xfffffffe}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x11, 0x4000}, {0x8, 0x15, 0x4}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x9}, {0x6, 0x11, 0x1}, {0x8, 0x15, 0xfef}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x7}, {0x6, 0x11, 0x9}, {0x8, 0x15, 0xbbd}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x40}, {0x6, 0x11, 0x3f}, {0x8, 0x15, 0x1ff}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x4}, {0x6, 0x11, 0x8}, {0x8, 0x15, 0x9}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6}, {0x8, 0x15, 0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8, 0xb, 0x9}, {0x6, 0x11, 0x1}, {0x8, 0x15, 0x8001}}]}, 0x240}, 0x1, 0x0, 0x0, 0x24000804}, 0x50) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:48:00 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000100)=@xdp={0x2c, 0x0, 0x0, 0x23}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000340)="eb2f21460f123d067d504ddb0344130e9ea793a1637e47df5ed04c5c5beffc223c05790f2a17917ac55d50fb44ef7a4397a30d884e55bcedaa8afd429d93622d2a6b772f92973d4e2929aec995f6d4d8d379712ae6099f1b54db44fa6c6ecf1365338729604eeef1e2afa9b32c26ff60f4bf3d0b46fcd80964bc9e08ac804436253c1da741597696a5f29829f0716e973c192a870b6f8a18b037dffe9571a2011db7b16d5e4893d39be99938ff3a808999", 0xb1}, {&(0x7f0000000400)="89eb9f3270fad4d1fada009008e12360f8a6d9364e052f67c20c576ad470753d548a5251b9ec1fe207b2420b23da96f1f3d062cb7aaf4eeeb66448cf32eaa82559ef723ed1493fbf61e14d687873607348997e7649c7000fe405a9800409229316c46ae902128107d59fc0e26573ebf38feab14d522365c41e88faab88a7ff681e6d1d02ee061bf70bdd2203663399fb186e2513413534c988ffdacfb04fb464aa66e22e0e9506321aabe30ee09bdfad3d0386271a78c9dfd7d671094fb219552d7065539de5c7c562e1fd9b57ee9db8c20e530ac153cb5a6a199f969dd606e69e098ecf3a4f6ece1555957412cf7ad9", 0xf0}, {&(0x7f0000000500)="a51edf5d9b1be434141032d153b51f4a66ce815dacd0ae62149eb6186181907b44e3a89883204d0c5163a5831f5140fb78100c0bee951b863d16bafa6d6d91597b48e051bc85636cb6805642eb8c26f50c092ce2677576", 0x57}, {&(0x7f0000000580)="6ec78b91c852516fd3fbacc5659012bc2314e05dd0c66f0674b9734fcd019f318427a5f792e0fbb75a10b56d2fd5d2e83bbeaa5e7ff6559cbff4ac3f743e0f855e2a6d560f50ec78851ead7e42780cdb02919968ad3cd7607a8527757fb1c5fed196c376e86d607e5c700a772eb981b5733d422c", 0x74}, {&(0x7f0000000600)="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", 0x1000}, {&(0x7f0000000180)="3226a8aa0429de53bd9a4c942b5fb74e344bf7d8c9c93805dd37d0470157b55429155cfe3163", 0x26}], 0x6, &(0x7f0000001640)=[{0xf8, 0x3a, 0x1, "64c82bbfa08d3fc23b13f656679c667c3eb00134f4e7c55c3d8581b6683a273d562c9d9cc082335fbae683a078e89bf2d16bf2c81cd2dc1290d9110c1fb757dca8ebf630d14ee723c7376915b46ad4fc1d0b89a777564ced89261dcf86c7dc5277b72b1439d5af7e11d5ca8a7676d41a9f4c179b121bde2a943ecddf3834d65430b290213218c0ead463c98cf68fc2a9d1fba0413a3f6477ee63b64e29d6c341291d0b6324e0cd5389e86ac760e74d4d5784b509065c2cbb8c68b460fe72be9add043217402b316cc3fbd20635557faaed88d5651f6801274004eafb95ace1aabb1282410076b49d7862"}, {0xc4, 0x119, 0x0, "ad5cf8b462aeb210c8cee38e0d3c6b9dd5da113885b7bfbd97c78affcb687dd15c1587ef7f04e224367d7692e4a9d22051bd0fcf9ec02222b5f60980d7edaea445f72308b02cc9702a48d13b27dc2ea201c7bb79ab371a03706fdf4115f501aebeab4aa1b0f6b025c422212a8d99c786d271524d159f04fb0a86903f09484ae9cea4eeea041eb52209084a408e0c1494d62f81265bc9aeb05fb24dbccc3a10ddaf32afac099c1d24af99223440c64b9971221c20d2f2"}, {0xcc, 0x10e, 0x1, "26c00e6a8c74c1eb9c0dfc4ca16ba42c132b78ad29c1c0ee168bde9b4302113c9d65c684df9f53d14c4af2b710742db40fbe049338f09f77396e504d02d7fd96663f6bc64c94b67f73f4464598bfa597416a36d25e8a9250ac34a06029473a206c763ae50ff1819a8fbdfab0a7766da7b0afd2223c133041db84b1c289bc739c58569b469fe5c17ad7091f1fdcd61e1276eecab0a05bee13b1cdc9c41262c6926a2c865c06eafa551666c547dd7c713f5fc0e03e897652eeab46d98a65b5"}, {0xcc, 0x118, 0x8, "e18d270827a53a1b55c16c0bbce13145fb1a1569f7e6e9bd80cd5f527443ed76e7c8c80226a1372ee938da2603558aa74bcc68a9fb1d18c2509d3755f6827122f51dcfd566bb9a2b0a3e5b21866b9f562a6aec358178c0d5dea34caac5eaab9451e018d42a05abe2383ea700c34416423502991c8dd3b557d21b2128740644295fa436b0354f24541a1c497122785042e7285545b8565a829b748177fe90f6564b7e3bd6b5a8f128a841dc594d1018c29f79b98f5d892128ba32f0d298f0b1"}], 0x354}, 0x80) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r2, 0xc0385720, &(0x7f0000001d40)={0x1}) splice(r1, 0x0, r3, 0x0, 0x7ffd, 0x0) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000001a40)='devlink\x00') sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r1, &(0x7f0000001d00)={&(0x7f0000001a00)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000001cc0)={&(0x7f0000001a80)={0x240, r4, 0x400, 0x70bd25, 0x25dfdbff, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x3f}, {0x6}, {0x8, 0x15, 0x9}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x5}, {0x6, 0x11, 0xfff8}, {0x8, 0x15, 0xfffffffe}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x11, 0x4000}, {0x8, 0x15, 0x4}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x9}, {0x6, 0x11, 0x1}, {0x8, 0x15, 0xfef}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x7}, {0x6, 0x11, 0x9}, {0x8, 0x15, 0xbbd}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x40}, {0x6, 0x11, 0x3f}, {0x8, 0x15, 0x1ff}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x4}, {0x6, 0x11, 0x8}, {0x8, 0x15, 0x9}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6}, {0x8, 0x15, 0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8, 0xb, 0x9}, {0x6, 0x11, 0x1}, {0x8, 0x15, 0x8001}}]}, 0x240}, 0x1, 0x0, 0x0, 0x24000804}, 0x50) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:48:00 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000100)=@xdp={0x2c, 0x0, 0x0, 0x23}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000340)="eb2f21460f123d067d504ddb0344130e9ea793a1637e47df5ed04c5c5beffc223c05790f2a17917ac55d50fb44ef7a4397a30d884e55bcedaa8afd429d93622d2a6b772f92973d4e2929aec995f6d4d8d379712ae6099f1b54db44fa6c6ecf1365338729604eeef1e2afa9b32c26ff60f4bf3d0b46fcd80964bc9e08ac804436253c1da741597696a5f29829f0716e973c192a870b6f8a18b037dffe9571a2011db7b16d5e4893d39be99938ff3a808999", 0xb1}, {&(0x7f0000000400)="89eb9f3270fad4d1fada009008e12360f8a6d9364e052f67c20c576ad470753d548a5251b9ec1fe207b2420b23da96f1f3d062cb7aaf4eeeb66448cf32eaa82559ef723ed1493fbf61e14d687873607348997e7649c7000fe405a9800409229316c46ae902128107d59fc0e26573ebf38feab14d522365c41e88faab88a7ff681e6d1d02ee061bf70bdd2203663399fb186e2513413534c988ffdacfb04fb464aa66e22e0e9506321aabe30ee09bdfad3d0386271a78c9dfd7d671094fb219552d7065539de5c7c562e1fd9b57ee9db8c20e530ac153cb5a6a199f969dd606e69e098ecf3a4f6ece1555957412cf7ad9", 0xf0}, {&(0x7f0000000500)="a51edf5d9b1be434141032d153b51f4a66ce815dacd0ae62149eb6186181907b44e3a89883204d0c5163a5831f5140fb78100c0bee951b863d16bafa6d6d91597b48e051bc85636cb6805642eb8c26f50c092ce2677576", 0x57}, {&(0x7f0000000580)="6ec78b91c852516fd3fbacc5659012bc2314e05dd0c66f0674b9734fcd019f318427a5f792e0fbb75a10b56d2fd5d2e83bbeaa5e7ff6559cbff4ac3f743e0f855e2a6d560f50ec78851ead7e42780cdb02919968ad3cd7607a8527757fb1c5fed196c376e86d607e5c700a772eb981b5733d422c", 0x74}, {&(0x7f0000000600)="f766d425ced4f9ad0ec8c2436cbfeb2bb1eee00cb4dc24953e6576ec0d7efcfd95be9668edcc47ca021505987edc58b7f8e91803c5ea2d69ed83fa60e3eb34ac8163d9ca09eaf79947975c31a2a3102c16783489d3cf0f56d3dbc15f5e5a99e00081b045046484318d804cc579c7d7a06aa835fb5f04b2c356414105ddf8aa09b228dee72e27648a6d32c4a13320f991f5a365e2a1f6009814f65f507630fbc24c44a4f587c6f698f4df840c863706147436dc7b7fa637d50fa6c27c304ae499e8d73c1867af3af8ad7e2db27ac14b7105eaadaa11874470fa2e84845dc84d2235b8447f8eccabf1803c76da32e623859e6189692d1fffb5cf2165ac88e1d16f72006346a938111ef5a066cd2dddd136095d2bf2adc87f82550e31e1b08ac1d931cde5ece9d7e08bc8d8618f5b33923d33c9871e68c79cf71ab679affe610a674dff1b33afa8f80e05cd3137646a134f244a42b1a07bf4464c61ec8aa207f6ae11de3e976bd16b67457193836db1645a33cbdb1b5fa4fb22089367eacf079612f0d9774b50f578c492d01a8e1e349ec9e810c4facb623c75bc3f8579c17e86c813524f3590040a9e4e2d57e0e1f274de6be4c8c5439417593d78ffd54d81af17217f25729706e44e900a14300e8ac52d793a94c17cd466bb4fef6ab9d870cd559de8522321107eb8dfc1b9154caf1abdf531650ae51edf6715951cd4aaf8552afa58d4d9362ebf313af6c75c3f68dd89c983b5d0757f0af95ab44bc54d23336df5fd0a6a67ecd805e1807b87f001763a5f507a642f62e4bc8d5a71c93d970bf2b8b8f1fd9e198d9bc9b07af0986cc189c3be099262692aae82430f5ebb47500ab6f87010859a28030f0ea459498e32a89df2eaf3749066aaccbc5ea10269affa18ca34c8e7a66efd380d2ce5c727bf8ffb09dd3c367e5e66488d31fe7953e01f2cc2dacee4c2fc840c1971271cd2ab9d4148dc2305a05bde7a0f8cb63a7bd274601c2acd2ac8c5a5da893e789c25221ac0577b857649c93a8fd110f129b89378555821c2e9e15ed3ed13919ed9d202c3f803caf31921a892ae3e123046477266029a27ecd0dcb7d44799a1a20bb10dca60d6d354806e04cfd8fd73f7a72401c660059c1d80b078b8788766c58699953858a3a71bf2ab5dd2336504d9503e23abf2a3cf0931da5365f80335a4af601ca95442211e1c9ecf5cbd2e5d02d16adb34892704b3ca7388204ee8103c3c8c7d5968e1eb1dd9041c7e1140f055e30a68637583ded4ca541b2f822d4cb9d594a7e2c4a0e89c90849d88b4b1bd2b46d18e0c8e163c8de52e8d64347ac495698ca2056a6f737b49d80949e5f9a3142f1280bc7c80df47f47007a04f0d93fa679fd606403b37897125eace3941740d7f333712f437a3cc7aef0e5b0baa5f2f26c7817c881a52ed2525561b13738c521c609b151548385bf823c0f6c0061ef322ba26de4bca606a80e735f44c466fef24bbc82f4a85486b5a64bc94d9ed2d81816c517b00f5c718f1e66cc7a8e2413f3654ee3220aac7c92c70633c94ed7b51896afb19dc58aeb527104269fa14d7df9c058a1701281b574ddbd00a53848a9d6aaff4a5b73ff87a32d56ce3d499ae5d606ffa7356724c530ab20afdfe8dc8e0565945c7b3efe70d36ae10a889f4f78950e087609ab59e87b61d2066392fa25697085b52ca97a99ef710dc0fa743d980ddba9758feda7ff91572db18588a52eca261bb1eaf677354d75a1ad35dadaf96641699eed074041f2fe02323dc65263b353fc2321cd173d94bd95657e93ca9d98307e6ae3f62e837b021a96334849aa924c7fedd5ef26b3efb53013a064cbc596ff42f86fa75978a33468d0f7e8abf0c1446d58987c50abfb5239f4c66eadf563915e5a6d322b7b0f950ba5adb39811b123917e736ea9ee0ebd403127aa61dc199fbd1fdb404457e91dfe589029bb7e391aacfeaedd57d9cc552aaa807c67c32c16c7555ab545c782bab8ee46a3b5f35f6f5a75217fe8d3efe67853d630366181e7a05376b83f918e88a1309acbf98a7e96d89dba2bcd4bb25857add94973174c0733ce47acf4b74127f302bf8b780150d5b13ff3ae9f859fe31f0ec5948df36f70ac530a18d3b3da8f28a9d01a967842b0bf95d8fb91194a3cd69d8d499916d0dc34b5049585e5908d83d8ad2add21265250d511db3dd320fb96b8f5dd898cabca5847a5d3d3960ae02f35148994624f945fb6fc231fe09b01e15c651f3983f3f4b59cac02b9285afc37faaf6c61a061ebb926dc1260fdcd5506ccdcd688b9d7cad4e2d2f6f459603accbc419999a3f7cbfd91cc8146ec665c7d331d0728bdb9e59d919703640d70082e684953447fe9f12e7754a726c4e5f987336c7ac7b9689e528c8fcdec7baaf62a3192adf54ef831a94e290193920292af30d1d849e34ac73848b04be142296f58fce621f349c23b418f424724a7e497e6305c5a615e18407cf6a71863d020b082fee7a222936903cd17920889b71ecb99b1491f833b764b26c93132e40c7b2c434a20877f02876691616e8f2f75669e5e8e4ceab2eb0ccfd7e0b2b9dacf3a4ebd2c319afc43b2b77c334e2d19111bac9d551fef830aa3a9334cbe4c6512ee9d441f12b782fcd7e017e759b3404de5e061b68e69f9f9d0d0469d1d0a95dc0fe7fb3a1526811af657a8bac1f9bad40e905e6d110d6f30934ab46d3915f9fa20cf2d752bc907e9f2274e260df7bf5f6fb9fce4d6f748b811484b9bb980122669f19f24e6f48c78dcfa0cc5fb39bbeb38eb3751ec048a0edeb541848e6d597cb000eb4f6a9d5672fde7c5e7161815ad974419e9794df51f6089809c44880eb7629d863cd4024db0cd72c59e769ffc43b6a904693f2e03b48b195743cfd19a183fc00c247d329a01c24ee8e0e4fe8e9664d2da1c93a39ebb09bb24e90e6336709d59910e09c4fc03b0ce0fcb8f524f6aa2594d82c0bf8e5bc45f1a764c11d0e3a044567d7fa657c5bb633f1c384f65bf5fb52ad168bbde53d91ca52c7cefa8d0db79c90ee16b9b205c31b558785aedb6d7a6a0e1079eb32cd54eaf5e8ea59fb5c42dd562f6b57faed4f2f1a0805906850c021b9284655cfbdeb7b3ea38c7201a5b97a4ac413897ba93ca6f27ae2a8def8b60be7bfb7fbe6443b1ecefccef931c25f59778eb85b881dadc470e05d559bfd92d440856835b00589b896cfa8a2595b5c5bc634ccdcddf008f00e5336b5ce4a0e9c0e2b7abcba65f200f456c531b9749e0eaa707246d0be6245780456363acaaeef0ee0cc725e4d90a97a93cd630a805bddfb03e86fd60e65b4a6720331b2b188389ed587b2314543db4b6e3f322602b25582524f342f76f9176bc7ed5d8ffbf4a059f9d02e1de10e22c705f1c5be0eb92ff4b58d7be55ba6a7e13bbac550f7f29f805f9944697f024226812431a27f594d2d28c03e275e44181ed8b97c6bb626182e55279b02358083fbffcf57be51240112e5a075224ebf6af1d9d891505fabd5e33164b22688aea678c2243f68dd786aad3a28c8ab4cbfc6caed977b391bc8462a8765ac65bcc8f3980240fcf7a8f06a26fc15e6d4d3796c19764b9e9854fb2aa835a9575df275c2aba655591b6e6400eb7e73424a8a06bf5fa7f284e44827132c6ab91334bb137a8d5fdaed023ad963e5b7b533a23dcaef1bdb15273d7fc1fa7490e33a65dea76e78eff2eea7db89eb06dffa62bf08719dc3b46d046d9192f9e875338a7de00b6d5468e18ee18bfbb7e82c23704a42cf9c3117eddb2b0c3c5af82fef792c810ef438c86f22cf269003801daf59807660fefb1ba51bdcc71431793921a6fb6c4fec7ce0f5c8b76ffb8def29bba4f6b86971477ff52b4cbaa3d1189ea286b3b3181132bfd4659e07fb3cc3f9ea17b8e9a4042dfd7100ade248867a27265a960036b5afb54792d87cf81e7596df6099b4ece3fc9e92a94db8caa9936d51e4a4c04eb70fa5e84c4352cf45efbcbe24019a99673c8e4f3452d2794cc0a2795a8685a8d4bb2da0234743a19fa2e5c64130e280845bebb475ea950e19e84eec66382cf560bfc37e6e839ada882e416cc12b6ecfb6c2afa4c139b6779717819bb5c7b10866f389e527780c9f3c6a5abb0449df258472aa9f1b598f7a0998b49f81bddbeb4a2ffe7bf85b86e9375ee19ec5889136b5673bfa21d3575f2fd807cfe09fc352ab6c3a4dcc1d8f1c9684c96e501cf483bbb3693d84c4ab0f5487c057d98605db31763944b43a05e99887a51987e2595bfa4ded85255d91a67c9c5d3e5496ba2bca86522f137f063075af3b654db8da18558d6932b249fe9527749d31e1961937e7e2ccf550fa71badd8e33e27432642b3f91e73638acee28b276546fe5adaf40122a61ceb712ca3c2787e86a24a6454c73c253a9da3e1089cc2707912bfef8d519869be8ac1ddbff3516fd35c13ab2980fd70a6116c37fc483bdd798cab3a0307a5d1809c0309eb763158ac3e53fcd70670de60eca6fa01fcca7236ef0bf5c5ab3e34c97a15633f260c14ee741bf87cb06264426b9771d805ec7411c04a42f00aea45a2aa1fc5c43650fd3698ee81060155fda3ebb5db088040cb753eb312862d82395f81f10c063f881aa30a21b56a10c4964146fc07660e2c8761e4509f04e94c2bc0f544bee9426994bb7becaf7b826e52b6d0bdb9338aaaed0e161b908c695368232e922448c855030422899008b7e67d8f7410a9e43d27b30ba96284b765dff664dd43fa72becac616b27cf51b46e109c617b9a5a51b64ead430025ddfafc2809e68157372eff6306682adfebdcd2b819443565e78492a268e2d982896aa8b4bf56a46992c4b43f7cfb9a654d086d08ac4d5b92aaeb77058fe54a6be7a22c95ae09550d113fc1b16d649ed240e0b59f98c28236644cdbafaeb5206db5e88ac9a4b3a95352a5ae9f3403487273e6c35e491c645874f45be6ab883140f176549e4501b7c7fdedf25fc7bc9cca57acd482c3b152ae8acafbac202cee7e06a0d10bc45c6ff6a9adbfc4663ba7d63fa6b5cfbcdde2acaa1d6d2d692b56821ca2256133f88b9af82abd731c21fd553dc37aff7407f79532991345a809c82d753101b7ac8c3147f437ca7894b89def8346c34a848bab66e624c749eab502e1fa1b3ac13fafe182cad000f1b4fafbdb3d3288665abc2f7fed5ea39d95e7fe4417d2be9ead693fa61fc413c685dd153dadc8fc90ebf7029391453b09ae61a84aa65f32cfd6646025ced1726070b48b8fb85a647f3e89486597de66c943986397a85a67508744df5e369a63d9e470efd306c4c0942abb762918d5638638ffb6e9a3ee43db67094c030fd70ae6aa91c7ffb059843aac0f7157e6c99415cdb87cf9250a8f211a650785a1eb8b499461eb76490dc616317ed48c77087501e16bdfd6d7ee4a0ffa5ed93ff0102d4097f81366e23201ff9fee563b23fc3675c6085226b815e710f79317b7f82a1abd764a241ecf827a66cb1c4ca8a8d7ff4097d9c18e3e17087f5ad9d799fb0cbe1200a980f99a2100662f4b8b75bb757fd1d315b404a2d3680b9944de730b72afd3e0be81fecf963a9795ef74deeaf24044801b0561b30bc862dec037aabf7df19c74d530f9fe146fce3052ffba76851f1fa371d9698ab5836e65bfe0809497416d326e784e737a128095bcaac7e2c93cccbbbdf2783dae797febcf2409edcd14df81d36503f111f6ef29c29bf6ee87dc99cbf4fcafa1ddee3244021d8297a87b017a6c8abcd9daaa27e39d9b6cd27c9a3afeb5cfa15fd3d66bca", 0x1000}, {&(0x7f0000000180)="3226a8aa0429de53bd9a4c942b5fb74e344bf7d8c9c93805dd37d0470157b55429155cfe3163", 0x26}], 0x6, &(0x7f0000001640)=[{0xf8, 0x3a, 0x1, "64c82bbfa08d3fc23b13f656679c667c3eb00134f4e7c55c3d8581b6683a273d562c9d9cc082335fbae683a078e89bf2d16bf2c81cd2dc1290d9110c1fb757dca8ebf630d14ee723c7376915b46ad4fc1d0b89a777564ced89261dcf86c7dc5277b72b1439d5af7e11d5ca8a7676d41a9f4c179b121bde2a943ecddf3834d65430b290213218c0ead463c98cf68fc2a9d1fba0413a3f6477ee63b64e29d6c341291d0b6324e0cd5389e86ac760e74d4d5784b509065c2cbb8c68b460fe72be9add043217402b316cc3fbd20635557faaed88d5651f6801274004eafb95ace1aabb1282410076b49d7862"}, {0xc4, 0x119, 0x0, "ad5cf8b462aeb210c8cee38e0d3c6b9dd5da113885b7bfbd97c78affcb687dd15c1587ef7f04e224367d7692e4a9d22051bd0fcf9ec02222b5f60980d7edaea445f72308b02cc9702a48d13b27dc2ea201c7bb79ab371a03706fdf4115f501aebeab4aa1b0f6b025c422212a8d99c786d271524d159f04fb0a86903f09484ae9cea4eeea041eb52209084a408e0c1494d62f81265bc9aeb05fb24dbccc3a10ddaf32afac099c1d24af99223440c64b9971221c20d2f2"}, {0xcc, 0x10e, 0x1, "26c00e6a8c74c1eb9c0dfc4ca16ba42c132b78ad29c1c0ee168bde9b4302113c9d65c684df9f53d14c4af2b710742db40fbe049338f09f77396e504d02d7fd96663f6bc64c94b67f73f4464598bfa597416a36d25e8a9250ac34a06029473a206c763ae50ff1819a8fbdfab0a7766da7b0afd2223c133041db84b1c289bc739c58569b469fe5c17ad7091f1fdcd61e1276eecab0a05bee13b1cdc9c41262c6926a2c865c06eafa551666c547dd7c713f5fc0e03e897652eeab46d98a65b5"}, {0xcc, 0x118, 0x8, "e18d270827a53a1b55c16c0bbce13145fb1a1569f7e6e9bd80cd5f527443ed76e7c8c80226a1372ee938da2603558aa74bcc68a9fb1d18c2509d3755f6827122f51dcfd566bb9a2b0a3e5b21866b9f562a6aec358178c0d5dea34caac5eaab9451e018d42a05abe2383ea700c34416423502991c8dd3b557d21b2128740644295fa436b0354f24541a1c497122785042e7285545b8565a829b748177fe90f6564b7e3bd6b5a8f128a841dc594d1018c29f79b98f5d892128ba32f0d298f0b1"}], 0x354}, 0x80) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r2, 0xc0385720, &(0x7f0000001d40)={0x1}) splice(r1, 0x0, r3, 0x0, 0x7ffd, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001a40)='devlink\x00') recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:48:00 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000100)=@xdp={0x2c, 0x0, 0x0, 0x23}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000340)="eb2f21460f123d067d504ddb0344130e9ea793a1637e47df5ed04c5c5beffc223c05790f2a17917ac55d50fb44ef7a4397a30d884e55bcedaa8afd429d93622d2a6b772f92973d4e2929aec995f6d4d8d379712ae6099f1b54db44fa6c6ecf1365338729604eeef1e2afa9b32c26ff60f4bf3d0b46fcd80964bc9e08ac804436253c1da741597696a5f29829f0716e973c192a870b6f8a18b037dffe9571a2011db7b16d5e4893d39be99938ff3a808999", 0xb1}, {&(0x7f0000000400)="89eb9f3270fad4d1fada009008e12360f8a6d9364e052f67c20c576ad470753d548a5251b9ec1fe207b2420b23da96f1f3d062cb7aaf4eeeb66448cf32eaa82559ef723ed1493fbf61e14d687873607348997e7649c7000fe405a9800409229316c46ae902128107d59fc0e26573ebf38feab14d522365c41e88faab88a7ff681e6d1d02ee061bf70bdd2203663399fb186e2513413534c988ffdacfb04fb464aa66e22e0e9506321aabe30ee09bdfad3d0386271a78c9dfd7d671094fb219552d7065539de5c7c562e1fd9b57ee9db8c20e530ac153cb5a6a199f969dd606e69e098ecf3a4f6ece1555957412cf7ad9", 0xf0}, {&(0x7f0000000500)="a51edf5d9b1be434141032d153b51f4a66ce815dacd0ae62149eb6186181907b44e3a89883204d0c5163a5831f5140fb78100c0bee951b863d16bafa6d6d91597b48e051bc85636cb6805642eb8c26f50c092ce2677576", 0x57}, {&(0x7f0000000580)="6ec78b91c852516fd3fbacc5659012bc2314e05dd0c66f0674b9734fcd019f318427a5f792e0fbb75a10b56d2fd5d2e83bbeaa5e7ff6559cbff4ac3f743e0f855e2a6d560f50ec78851ead7e42780cdb02919968ad3cd7607a8527757fb1c5fed196c376e86d607e5c700a772eb981b5733d422c", 0x74}, {&(0x7f0000000600)="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", 0x1000}, {&(0x7f0000000180)="3226a8aa0429de53bd9a4c942b5fb74e344bf7d8c9c93805dd37d0470157b55429155cfe3163", 0x26}], 0x6, &(0x7f0000001640)=[{0xf8, 0x3a, 0x1, "64c82bbfa08d3fc23b13f656679c667c3eb00134f4e7c55c3d8581b6683a273d562c9d9cc082335fbae683a078e89bf2d16bf2c81cd2dc1290d9110c1fb757dca8ebf630d14ee723c7376915b46ad4fc1d0b89a777564ced89261dcf86c7dc5277b72b1439d5af7e11d5ca8a7676d41a9f4c179b121bde2a943ecddf3834d65430b290213218c0ead463c98cf68fc2a9d1fba0413a3f6477ee63b64e29d6c341291d0b6324e0cd5389e86ac760e74d4d5784b509065c2cbb8c68b460fe72be9add043217402b316cc3fbd20635557faaed88d5651f6801274004eafb95ace1aabb1282410076b49d7862"}, {0xc4, 0x119, 0x0, "ad5cf8b462aeb210c8cee38e0d3c6b9dd5da113885b7bfbd97c78affcb687dd15c1587ef7f04e224367d7692e4a9d22051bd0fcf9ec02222b5f60980d7edaea445f72308b02cc9702a48d13b27dc2ea201c7bb79ab371a03706fdf4115f501aebeab4aa1b0f6b025c422212a8d99c786d271524d159f04fb0a86903f09484ae9cea4eeea041eb52209084a408e0c1494d62f81265bc9aeb05fb24dbccc3a10ddaf32afac099c1d24af99223440c64b9971221c20d2f2"}, {0xcc, 0x10e, 0x1, "26c00e6a8c74c1eb9c0dfc4ca16ba42c132b78ad29c1c0ee168bde9b4302113c9d65c684df9f53d14c4af2b710742db40fbe049338f09f77396e504d02d7fd96663f6bc64c94b67f73f4464598bfa597416a36d25e8a9250ac34a06029473a206c763ae50ff1819a8fbdfab0a7766da7b0afd2223c133041db84b1c289bc739c58569b469fe5c17ad7091f1fdcd61e1276eecab0a05bee13b1cdc9c41262c6926a2c865c06eafa551666c547dd7c713f5fc0e03e897652eeab46d98a65b5"}, {0xcc, 0x118, 0x8, "e18d270827a53a1b55c16c0bbce13145fb1a1569f7e6e9bd80cd5f527443ed76e7c8c80226a1372ee938da2603558aa74bcc68a9fb1d18c2509d3755f6827122f51dcfd566bb9a2b0a3e5b21866b9f562a6aec358178c0d5dea34caac5eaab9451e018d42a05abe2383ea700c34416423502991c8dd3b557d21b2128740644295fa436b0354f24541a1c497122785042e7285545b8565a829b748177fe90f6564b7e3bd6b5a8f128a841dc594d1018c29f79b98f5d892128ba32f0d298f0b1"}], 0x354}, 0x80) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r2, 0xc0385720, &(0x7f0000001d40)={0x1}) splice(r1, 0x0, r3, 0x0, 0x7ffd, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:48:00 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000100)=@xdp={0x2c, 0x0, 0x0, 0x23}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000340)="eb2f21460f123d067d504ddb0344130e9ea793a1637e47df5ed04c5c5beffc223c05790f2a17917ac55d50fb44ef7a4397a30d884e55bcedaa8afd429d93622d2a6b772f92973d4e2929aec995f6d4d8d379712ae6099f1b54db44fa6c6ecf1365338729604eeef1e2afa9b32c26ff60f4bf3d0b46fcd80964bc9e08ac804436253c1da741597696a5f29829f0716e973c192a870b6f8a18b037dffe9571a2011db7b16d5e4893d39be99938ff3a808999", 0xb1}, {&(0x7f0000000400)="89eb9f3270fad4d1fada009008e12360f8a6d9364e052f67c20c576ad470753d548a5251b9ec1fe207b2420b23da96f1f3d062cb7aaf4eeeb66448cf32eaa82559ef723ed1493fbf61e14d687873607348997e7649c7000fe405a9800409229316c46ae902128107d59fc0e26573ebf38feab14d522365c41e88faab88a7ff681e6d1d02ee061bf70bdd2203663399fb186e2513413534c988ffdacfb04fb464aa66e22e0e9506321aabe30ee09bdfad3d0386271a78c9dfd7d671094fb219552d7065539de5c7c562e1fd9b57ee9db8c20e530ac153cb5a6a199f969dd606e69e098ecf3a4f6ece1555957412cf7ad9", 0xf0}, {&(0x7f0000000500)="a51edf5d9b1be434141032d153b51f4a66ce815dacd0ae62149eb6186181907b44e3a89883204d0c5163a5831f5140fb78100c0bee951b863d16bafa6d6d91597b48e051bc85636cb6805642eb8c26f50c092ce2677576", 0x57}, {&(0x7f0000000580)="6ec78b91c852516fd3fbacc5659012bc2314e05dd0c66f0674b9734fcd019f318427a5f792e0fbb75a10b56d2fd5d2e83bbeaa5e7ff6559cbff4ac3f743e0f855e2a6d560f50ec78851ead7e42780cdb02919968ad3cd7607a8527757fb1c5fed196c376e86d607e5c700a772eb981b5733d422c", 0x74}, {&(0x7f0000000600)="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", 0x1000}, {&(0x7f0000000180)="3226a8aa0429de53bd9a4c942b5fb74e344bf7d8c9c93805dd37d0470157b55429155cfe3163", 0x26}], 0x6, &(0x7f0000001640)=[{0xf8, 0x3a, 0x1, "64c82bbfa08d3fc23b13f656679c667c3eb00134f4e7c55c3d8581b6683a273d562c9d9cc082335fbae683a078e89bf2d16bf2c81cd2dc1290d9110c1fb757dca8ebf630d14ee723c7376915b46ad4fc1d0b89a777564ced89261dcf86c7dc5277b72b1439d5af7e11d5ca8a7676d41a9f4c179b121bde2a943ecddf3834d65430b290213218c0ead463c98cf68fc2a9d1fba0413a3f6477ee63b64e29d6c341291d0b6324e0cd5389e86ac760e74d4d5784b509065c2cbb8c68b460fe72be9add043217402b316cc3fbd20635557faaed88d5651f6801274004eafb95ace1aabb1282410076b49d7862"}, {0xc4, 0x119, 0x0, "ad5cf8b462aeb210c8cee38e0d3c6b9dd5da113885b7bfbd97c78affcb687dd15c1587ef7f04e224367d7692e4a9d22051bd0fcf9ec02222b5f60980d7edaea445f72308b02cc9702a48d13b27dc2ea201c7bb79ab371a03706fdf4115f501aebeab4aa1b0f6b025c422212a8d99c786d271524d159f04fb0a86903f09484ae9cea4eeea041eb52209084a408e0c1494d62f81265bc9aeb05fb24dbccc3a10ddaf32afac099c1d24af99223440c64b9971221c20d2f2"}, {0xcc, 0x10e, 0x1, "26c00e6a8c74c1eb9c0dfc4ca16ba42c132b78ad29c1c0ee168bde9b4302113c9d65c684df9f53d14c4af2b710742db40fbe049338f09f77396e504d02d7fd96663f6bc64c94b67f73f4464598bfa597416a36d25e8a9250ac34a06029473a206c763ae50ff1819a8fbdfab0a7766da7b0afd2223c133041db84b1c289bc739c58569b469fe5c17ad7091f1fdcd61e1276eecab0a05bee13b1cdc9c41262c6926a2c865c06eafa551666c547dd7c713f5fc0e03e897652eeab46d98a65b5"}, {0xcc, 0x118, 0x8, "e18d270827a53a1b55c16c0bbce13145fb1a1569f7e6e9bd80cd5f527443ed76e7c8c80226a1372ee938da2603558aa74bcc68a9fb1d18c2509d3755f6827122f51dcfd566bb9a2b0a3e5b21866b9f562a6aec358178c0d5dea34caac5eaab9451e018d42a05abe2383ea700c34416423502991c8dd3b557d21b2128740644295fa436b0354f24541a1c497122785042e7285545b8565a829b748177fe90f6564b7e3bd6b5a8f128a841dc594d1018c29f79b98f5d892128ba32f0d298f0b1"}], 0x354}, 0x80) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r1, 0xc0385720, &(0x7f0000001d40)={0x1}) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:48:00 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000100)=@xdp={0x2c, 0x0, 0x0, 0x23}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000340)="eb2f21460f123d067d504ddb0344130e9ea793a1637e47df5ed04c5c5beffc223c05790f2a17917ac55d50fb44ef7a4397a30d884e55bcedaa8afd429d93622d2a6b772f92973d4e2929aec995f6d4d8d379712ae6099f1b54db44fa6c6ecf1365338729604eeef1e2afa9b32c26ff60f4bf3d0b46fcd80964bc9e08ac804436253c1da741597696a5f29829f0716e973c192a870b6f8a18b037dffe9571a2011db7b16d5e4893d39be99938ff3a808999", 0xb1}, {&(0x7f0000000400)="89eb9f3270fad4d1fada009008e12360f8a6d9364e052f67c20c576ad470753d548a5251b9ec1fe207b2420b23da96f1f3d062cb7aaf4eeeb66448cf32eaa82559ef723ed1493fbf61e14d687873607348997e7649c7000fe405a9800409229316c46ae902128107d59fc0e26573ebf38feab14d522365c41e88faab88a7ff681e6d1d02ee061bf70bdd2203663399fb186e2513413534c988ffdacfb04fb464aa66e22e0e9506321aabe30ee09bdfad3d0386271a78c9dfd7d671094fb219552d7065539de5c7c562e1fd9b57ee9db8c20e530ac153cb5a6a199f969dd606e69e098ecf3a4f6ece1555957412cf7ad9", 0xf0}, {&(0x7f0000000500)="a51edf5d9b1be434141032d153b51f4a66ce815dacd0ae62149eb6186181907b44e3a89883204d0c5163a5831f5140fb78100c0bee951b863d16bafa6d6d91597b48e051bc85636cb6805642eb8c26f50c092ce2677576", 0x57}, {&(0x7f0000000580)="6ec78b91c852516fd3fbacc5659012bc2314e05dd0c66f0674b9734fcd019f318427a5f792e0fbb75a10b56d2fd5d2e83bbeaa5e7ff6559cbff4ac3f743e0f855e2a6d560f50ec78851ead7e42780cdb02919968ad3cd7607a8527757fb1c5fed196c376e86d607e5c700a772eb981b5733d422c", 0x74}, {&(0x7f0000000600)="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", 0x1000}, {&(0x7f0000000180)="3226a8aa0429de53bd9a4c942b5fb74e344bf7d8c9c93805dd37d0470157b55429155cfe3163", 0x26}], 0x6, &(0x7f0000001640)=[{0xf8, 0x3a, 0x1, "64c82bbfa08d3fc23b13f656679c667c3eb00134f4e7c55c3d8581b6683a273d562c9d9cc082335fbae683a078e89bf2d16bf2c81cd2dc1290d9110c1fb757dca8ebf630d14ee723c7376915b46ad4fc1d0b89a777564ced89261dcf86c7dc5277b72b1439d5af7e11d5ca8a7676d41a9f4c179b121bde2a943ecddf3834d65430b290213218c0ead463c98cf68fc2a9d1fba0413a3f6477ee63b64e29d6c341291d0b6324e0cd5389e86ac760e74d4d5784b509065c2cbb8c68b460fe72be9add043217402b316cc3fbd20635557faaed88d5651f6801274004eafb95ace1aabb1282410076b49d7862"}, {0xc4, 0x119, 0x0, "ad5cf8b462aeb210c8cee38e0d3c6b9dd5da113885b7bfbd97c78affcb687dd15c1587ef7f04e224367d7692e4a9d22051bd0fcf9ec02222b5f60980d7edaea445f72308b02cc9702a48d13b27dc2ea201c7bb79ab371a03706fdf4115f501aebeab4aa1b0f6b025c422212a8d99c786d271524d159f04fb0a86903f09484ae9cea4eeea041eb52209084a408e0c1494d62f81265bc9aeb05fb24dbccc3a10ddaf32afac099c1d24af99223440c64b9971221c20d2f2"}, {0xcc, 0x10e, 0x1, "26c00e6a8c74c1eb9c0dfc4ca16ba42c132b78ad29c1c0ee168bde9b4302113c9d65c684df9f53d14c4af2b710742db40fbe049338f09f77396e504d02d7fd96663f6bc64c94b67f73f4464598bfa597416a36d25e8a9250ac34a06029473a206c763ae50ff1819a8fbdfab0a7766da7b0afd2223c133041db84b1c289bc739c58569b469fe5c17ad7091f1fdcd61e1276eecab0a05bee13b1cdc9c41262c6926a2c865c06eafa551666c547dd7c713f5fc0e03e897652eeab46d98a65b5"}, {0xcc, 0x118, 0x8, "e18d270827a53a1b55c16c0bbce13145fb1a1569f7e6e9bd80cd5f527443ed76e7c8c80226a1372ee938da2603558aa74bcc68a9fb1d18c2509d3755f6827122f51dcfd566bb9a2b0a3e5b21866b9f562a6aec358178c0d5dea34caac5eaab9451e018d42a05abe2383ea700c34416423502991c8dd3b557d21b2128740644295fa436b0354f24541a1c497122785042e7285545b8565a829b748177fe90f6564b7e3bd6b5a8f128a841dc594d1018c29f79b98f5d892128ba32f0d298f0b1"}], 0x354}, 0x80) pipe(&(0x7f0000000240)) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:48:01 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000100)=@xdp={0x2c, 0x0, 0x0, 0x23}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000340)="eb2f21460f123d067d504ddb0344130e9ea793a1637e47df5ed04c5c5beffc223c05790f2a17917ac55d50fb44ef7a4397a30d884e55bcedaa8afd429d93622d2a6b772f92973d4e2929aec995f6d4d8d379712ae6099f1b54db44fa6c6ecf1365338729604eeef1e2afa9b32c26ff60f4bf3d0b46fcd80964bc9e08ac804436253c1da741597696a5f29829f0716e973c192a870b6f8a18b037dffe9571a2011db7b16d5e4893d39be99938ff3a808999", 0xb1}, {&(0x7f0000000400)="89eb9f3270fad4d1fada009008e12360f8a6d9364e052f67c20c576ad470753d548a5251b9ec1fe207b2420b23da96f1f3d062cb7aaf4eeeb66448cf32eaa82559ef723ed1493fbf61e14d687873607348997e7649c7000fe405a9800409229316c46ae902128107d59fc0e26573ebf38feab14d522365c41e88faab88a7ff681e6d1d02ee061bf70bdd2203663399fb186e2513413534c988ffdacfb04fb464aa66e22e0e9506321aabe30ee09bdfad3d0386271a78c9dfd7d671094fb219552d7065539de5c7c562e1fd9b57ee9db8c20e530ac153cb5a6a199f969dd606e69e098ecf3a4f6ece1555957412cf7ad9", 0xf0}, {&(0x7f0000000500)="a51edf5d9b1be434141032d153b51f4a66ce815dacd0ae62149eb6186181907b44e3a89883204d0c5163a5831f5140fb78100c0bee951b863d16bafa6d6d91597b48e051bc85636cb6805642eb8c26f50c092ce2677576", 0x57}, {&(0x7f0000000580)="6ec78b91c852516fd3fbacc5659012bc2314e05dd0c66f0674b9734fcd019f318427a5f792e0fbb75a10b56d2fd5d2e83bbeaa5e7ff6559cbff4ac3f743e0f855e2a6d560f50ec78851ead7e42780cdb02919968ad3cd7607a8527757fb1c5fed196c376e86d607e5c700a772eb981b5733d422c", 0x74}, {&(0x7f0000000600)="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", 0x1000}, {&(0x7f0000000180)="3226a8aa0429de53bd9a4c942b5fb74e344bf7d8c9c93805dd37d0470157b55429155cfe3163", 0x26}], 0x6, &(0x7f0000001640)=[{0xf8, 0x3a, 0x1, "64c82bbfa08d3fc23b13f656679c667c3eb00134f4e7c55c3d8581b6683a273d562c9d9cc082335fbae683a078e89bf2d16bf2c81cd2dc1290d9110c1fb757dca8ebf630d14ee723c7376915b46ad4fc1d0b89a777564ced89261dcf86c7dc5277b72b1439d5af7e11d5ca8a7676d41a9f4c179b121bde2a943ecddf3834d65430b290213218c0ead463c98cf68fc2a9d1fba0413a3f6477ee63b64e29d6c341291d0b6324e0cd5389e86ac760e74d4d5784b509065c2cbb8c68b460fe72be9add043217402b316cc3fbd20635557faaed88d5651f6801274004eafb95ace1aabb1282410076b49d7862"}, {0xc4, 0x119, 0x0, "ad5cf8b462aeb210c8cee38e0d3c6b9dd5da113885b7bfbd97c78affcb687dd15c1587ef7f04e224367d7692e4a9d22051bd0fcf9ec02222b5f60980d7edaea445f72308b02cc9702a48d13b27dc2ea201c7bb79ab371a03706fdf4115f501aebeab4aa1b0f6b025c422212a8d99c786d271524d159f04fb0a86903f09484ae9cea4eeea041eb52209084a408e0c1494d62f81265bc9aeb05fb24dbccc3a10ddaf32afac099c1d24af99223440c64b9971221c20d2f2"}, {0xcc, 0x10e, 0x1, "26c00e6a8c74c1eb9c0dfc4ca16ba42c132b78ad29c1c0ee168bde9b4302113c9d65c684df9f53d14c4af2b710742db40fbe049338f09f77396e504d02d7fd96663f6bc64c94b67f73f4464598bfa597416a36d25e8a9250ac34a06029473a206c763ae50ff1819a8fbdfab0a7766da7b0afd2223c133041db84b1c289bc739c58569b469fe5c17ad7091f1fdcd61e1276eecab0a05bee13b1cdc9c41262c6926a2c865c06eafa551666c547dd7c713f5fc0e03e897652eeab46d98a65b5"}, {0xcc, 0x118, 0x8, "e18d270827a53a1b55c16c0bbce13145fb1a1569f7e6e9bd80cd5f527443ed76e7c8c80226a1372ee938da2603558aa74bcc68a9fb1d18c2509d3755f6827122f51dcfd566bb9a2b0a3e5b21866b9f562a6aec358178c0d5dea34caac5eaab9451e018d42a05abe2383ea700c34416423502991c8dd3b557d21b2128740644295fa436b0354f24541a1c497122785042e7285545b8565a829b748177fe90f6564b7e3bd6b5a8f128a841dc594d1018c29f79b98f5d892128ba32f0d298f0b1"}], 0x354}, 0x80) pipe(&(0x7f0000000240)) socket$inet_udp(0x2, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 354.031685][ T30] Bluetooth: hci0: command 0x0419 tx timeout 12:48:01 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000100)=@xdp={0x2c, 0x0, 0x0, 0x23}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000340)="eb2f21460f123d067d504ddb0344130e9ea793a1637e47df5ed04c5c5beffc223c05790f2a17917ac55d50fb44ef7a4397a30d884e55bcedaa8afd429d93622d2a6b772f92973d4e2929aec995f6d4d8d379712ae6099f1b54db44fa6c6ecf1365338729604eeef1e2afa9b32c26ff60f4bf3d0b46fcd80964bc9e08ac804436253c1da741597696a5f29829f0716e973c192a870b6f8a18b037dffe9571a2011db7b16d5e4893d39be99938ff3a808999", 0xb1}, {&(0x7f0000000400)="89eb9f3270fad4d1fada009008e12360f8a6d9364e052f67c20c576ad470753d548a5251b9ec1fe207b2420b23da96f1f3d062cb7aaf4eeeb66448cf32eaa82559ef723ed1493fbf61e14d687873607348997e7649c7000fe405a9800409229316c46ae902128107d59fc0e26573ebf38feab14d522365c41e88faab88a7ff681e6d1d02ee061bf70bdd2203663399fb186e2513413534c988ffdacfb04fb464aa66e22e0e9506321aabe30ee09bdfad3d0386271a78c9dfd7d671094fb219552d7065539de5c7c562e1fd9b57ee9db8c20e530ac153cb5a6a199f969dd606e69e098ecf3a4f6ece1555957412cf7ad9", 0xf0}, {&(0x7f0000000500)="a51edf5d9b1be434141032d153b51f4a66ce815dacd0ae62149eb6186181907b44e3a89883204d0c5163a5831f5140fb78100c0bee951b863d16bafa6d6d91597b48e051bc85636cb6805642eb8c26f50c092ce2677576", 0x57}, {&(0x7f0000000580)="6ec78b91c852516fd3fbacc5659012bc2314e05dd0c66f0674b9734fcd019f318427a5f792e0fbb75a10b56d2fd5d2e83bbeaa5e7ff6559cbff4ac3f743e0f855e2a6d560f50ec78851ead7e42780cdb02919968ad3cd7607a8527757fb1c5fed196c376e86d607e5c700a772eb981b5733d422c", 0x74}, {&(0x7f0000000600)="f766d425ced4f9ad0ec8c2436cbfeb2bb1eee00cb4dc24953e6576ec0d7efcfd95be9668edcc47ca021505987edc58b7f8e91803c5ea2d69ed83fa60e3eb34ac8163d9ca09eaf79947975c31a2a3102c16783489d3cf0f56d3dbc15f5e5a99e00081b045046484318d804cc579c7d7a06aa835fb5f04b2c356414105ddf8aa09b228dee72e27648a6d32c4a13320f991f5a365e2a1f6009814f65f507630fbc24c44a4f587c6f698f4df840c863706147436dc7b7fa637d50fa6c27c304ae499e8d73c1867af3af8ad7e2db27ac14b7105eaadaa11874470fa2e84845dc84d2235b8447f8eccabf1803c76da32e623859e6189692d1fffb5cf2165ac88e1d16f72006346a938111ef5a066cd2dddd136095d2bf2adc87f82550e31e1b08ac1d931cde5ece9d7e08bc8d8618f5b33923d33c9871e68c79cf71ab679affe610a674dff1b33afa8f80e05cd3137646a134f244a42b1a07bf4464c61ec8aa207f6ae11de3e976bd16b67457193836db1645a33cbdb1b5fa4fb22089367eacf079612f0d9774b50f578c492d01a8e1e349ec9e810c4facb623c75bc3f8579c17e86c813524f3590040a9e4e2d57e0e1f274de6be4c8c5439417593d78ffd54d81af17217f25729706e44e900a14300e8ac52d793a94c17cd466bb4fef6ab9d870cd559de8522321107eb8dfc1b9154caf1abdf531650ae51edf6715951cd4aaf8552afa58d4d9362ebf313af6c75c3f68dd89c983b5d0757f0af95ab44bc54d23336df5fd0a6a67ecd805e1807b87f001763a5f507a642f62e4bc8d5a71c93d970bf2b8b8f1fd9e198d9bc9b07af0986cc189c3be099262692aae82430f5ebb47500ab6f87010859a28030f0ea459498e32a89df2eaf3749066aaccbc5ea10269affa18ca34c8e7a66efd380d2ce5c727bf8ffb09dd3c367e5e66488d31fe7953e01f2cc2dacee4c2fc840c1971271cd2ab9d4148dc2305a05bde7a0f8cb63a7bd274601c2acd2ac8c5a5da893e789c25221ac0577b857649c93a8fd110f129b89378555821c2e9e15ed3ed13919ed9d202c3f803caf31921a892ae3e123046477266029a27ecd0dcb7d44799a1a20bb10dca60d6d354806e04cfd8fd73f7a72401c660059c1d80b078b8788766c58699953858a3a71bf2ab5dd2336504d9503e23abf2a3cf0931da5365f80335a4af601ca95442211e1c9ecf5cbd2e5d02d16adb34892704b3ca7388204ee8103c3c8c7d5968e1eb1dd9041c7e1140f055e30a68637583ded4ca541b2f822d4cb9d594a7e2c4a0e89c90849d88b4b1bd2b46d18e0c8e163c8de52e8d64347ac495698ca2056a6f737b49d80949e5f9a3142f1280bc7c80df47f47007a04f0d93fa679fd606403b37897125eace3941740d7f333712f437a3cc7aef0e5b0baa5f2f26c7817c881a52ed2525561b13738c521c609b151548385bf823c0f6c0061ef322ba26de4bca606a80e735f44c466fef24bbc82f4a85486b5a64bc94d9ed2d81816c517b00f5c718f1e66cc7a8e2413f3654ee3220aac7c92c70633c94ed7b51896afb19dc58aeb527104269fa14d7df9c058a1701281b574ddbd00a53848a9d6aaff4a5b73ff87a32d56ce3d499ae5d606ffa7356724c530ab20afdfe8dc8e0565945c7b3efe70d36ae10a889f4f78950e087609ab59e87b61d2066392fa25697085b52ca97a99ef710dc0fa743d980ddba9758feda7ff91572db18588a52eca261bb1eaf677354d75a1ad35dadaf96641699eed074041f2fe02323dc65263b353fc2321cd173d94bd95657e93ca9d98307e6ae3f62e837b021a96334849aa924c7fedd5ef26b3efb53013a064cbc596ff42f86fa75978a33468d0f7e8abf0c1446d58987c50abfb5239f4c66eadf563915e5a6d322b7b0f950ba5adb39811b123917e736ea9ee0ebd403127aa61dc199fbd1fdb404457e91dfe589029bb7e391aacfeaedd57d9cc552aaa807c67c32c16c7555ab545c782bab8ee46a3b5f35f6f5a75217fe8d3efe67853d630366181e7a05376b83f918e88a1309acbf98a7e96d89dba2bcd4bb25857add94973174c0733ce47acf4b74127f302bf8b780150d5b13ff3ae9f859fe31f0ec5948df36f70ac530a18d3b3da8f28a9d01a967842b0bf95d8fb91194a3cd69d8d499916d0dc34b5049585e5908d83d8ad2add21265250d511db3dd320fb96b8f5dd898cabca5847a5d3d3960ae02f35148994624f945fb6fc231fe09b01e15c651f3983f3f4b59cac02b9285afc37faaf6c61a061ebb926dc1260fdcd5506ccdcd688b9d7cad4e2d2f6f459603accbc419999a3f7cbfd91cc8146ec665c7d331d0728bdb9e59d919703640d70082e684953447fe9f12e7754a726c4e5f987336c7ac7b9689e528c8fcdec7baaf62a3192adf54ef831a94e290193920292af30d1d849e34ac73848b04be142296f58fce621f349c23b418f424724a7e497e6305c5a615e18407cf6a71863d020b082fee7a222936903cd17920889b71ecb99b1491f833b764b26c93132e40c7b2c434a20877f02876691616e8f2f75669e5e8e4ceab2eb0ccfd7e0b2b9dacf3a4ebd2c319afc43b2b77c334e2d19111bac9d551fef830aa3a9334cbe4c6512ee9d441f12b782fcd7e017e759b3404de5e061b68e69f9f9d0d0469d1d0a95dc0fe7fb3a1526811af657a8bac1f9bad40e905e6d110d6f30934ab46d3915f9fa20cf2d752bc907e9f2274e260df7bf5f6fb9fce4d6f748b811484b9bb980122669f19f24e6f48c78dcfa0cc5fb39bbeb38eb3751ec048a0edeb541848e6d597cb000eb4f6a9d5672fde7c5e7161815ad974419e9794df51f6089809c44880eb7629d863cd4024db0cd72c59e769ffc43b6a904693f2e03b48b195743cfd19a183fc00c247d329a01c24ee8e0e4fe8e9664d2da1c93a39ebb09bb24e90e6336709d59910e09c4fc03b0ce0fcb8f524f6aa2594d82c0bf8e5bc45f1a764c11d0e3a044567d7fa657c5bb633f1c384f65bf5fb52ad168bbde53d91ca52c7cefa8d0db79c90ee16b9b205c31b558785aedb6d7a6a0e1079eb32cd54eaf5e8ea59fb5c42dd562f6b57faed4f2f1a0805906850c021b9284655cfbdeb7b3ea38c7201a5b97a4ac413897ba93ca6f27ae2a8def8b60be7bfb7fbe6443b1ecefccef931c25f59778eb85b881dadc470e05d559bfd92d440856835b00589b896cfa8a2595b5c5bc634ccdcddf008f00e5336b5ce4a0e9c0e2b7abcba65f200f456c531b9749e0eaa707246d0be6245780456363acaaeef0ee0cc725e4d90a97a93cd630a805bddfb03e86fd60e65b4a6720331b2b188389ed587b2314543db4b6e3f322602b25582524f342f76f9176bc7ed5d8ffbf4a059f9d02e1de10e22c705f1c5be0eb92ff4b58d7be55ba6a7e13bbac550f7f29f805f9944697f024226812431a27f594d2d28c03e275e44181ed8b97c6bb626182e55279b02358083fbffcf57be51240112e5a075224ebf6af1d9d891505fabd5e33164b22688aea678c2243f68dd786aad3a28c8ab4cbfc6caed977b391bc8462a8765ac65bcc8f3980240fcf7a8f06a26fc15e6d4d3796c19764b9e9854fb2aa835a9575df275c2aba655591b6e6400eb7e73424a8a06bf5fa7f284e44827132c6ab91334bb137a8d5fdaed023ad963e5b7b533a23dcaef1bdb15273d7fc1fa7490e33a65dea76e78eff2eea7db89eb06dffa62bf08719dc3b46d046d9192f9e875338a7de00b6d5468e18ee18bfbb7e82c23704a42cf9c3117eddb2b0c3c5af82fef792c810ef438c86f22cf269003801daf59807660fefb1ba51bdcc71431793921a6fb6c4fec7ce0f5c8b76ffb8def29bba4f6b86971477ff52b4cbaa3d1189ea286b3b3181132bfd4659e07fb3cc3f9ea17b8e9a4042dfd7100ade248867a27265a960036b5afb54792d87cf81e7596df6099b4ece3fc9e92a94db8caa9936d51e4a4c04eb70fa5e84c4352cf45efbcbe24019a99673c8e4f3452d2794cc0a2795a8685a8d4bb2da0234743a19fa2e5c64130e280845bebb475ea950e19e84eec66382cf560bfc37e6e839ada882e416cc12b6ecfb6c2afa4c139b6779717819bb5c7b10866f389e527780c9f3c6a5abb0449df258472aa9f1b598f7a0998b49f81bddbeb4a2ffe7bf85b86e9375ee19ec5889136b5673bfa21d3575f2fd807cfe09fc352ab6c3a4dcc1d8f1c9684c96e501cf483bbb3693d84c4ab0f5487c057d98605db31763944b43a05e99887a51987e2595bfa4ded85255d91a67c9c5d3e5496ba2bca86522f137f063075af3b654db8da18558d6932b249fe9527749d31e1961937e7e2ccf550fa71badd8e33e27432642b3f91e73638acee28b276546fe5adaf40122a61ceb712ca3c2787e86a24a6454c73c253a9da3e1089cc2707912bfef8d519869be8ac1ddbff3516fd35c13ab2980fd70a6116c37fc483bdd798cab3a0307a5d1809c0309eb763158ac3e53fcd70670de60eca6fa01fcca7236ef0bf5c5ab3e34c97a15633f260c14ee741bf87cb06264426b9771d805ec7411c04a42f00aea45a2aa1fc5c43650fd3698ee81060155fda3ebb5db088040cb753eb312862d82395f81f10c063f881aa30a21b56a10c4964146fc07660e2c8761e4509f04e94c2bc0f544bee9426994bb7becaf7b826e52b6d0bdb9338aaaed0e161b908c695368232e922448c855030422899008b7e67d8f7410a9e43d27b30ba96284b765dff664dd43fa72becac616b27cf51b46e109c617b9a5a51b64ead430025ddfafc2809e68157372eff6306682adfebdcd2b819443565e78492a268e2d982896aa8b4bf56a46992c4b43f7cfb9a654d086d08ac4d5b92aaeb77058fe54a6be7a22c95ae09550d113fc1b16d649ed240e0b59f98c28236644cdbafaeb5206db5e88ac9a4b3a95352a5ae9f3403487273e6c35e491c645874f45be6ab883140f176549e4501b7c7fdedf25fc7bc9cca57acd482c3b152ae8acafbac202cee7e06a0d10bc45c6ff6a9adbfc4663ba7d63fa6b5cfbcdde2acaa1d6d2d692b56821ca2256133f88b9af82abd731c21fd553dc37aff7407f79532991345a809c82d753101b7ac8c3147f437ca7894b89def8346c34a848bab66e624c749eab502e1fa1b3ac13fafe182cad000f1b4fafbdb3d3288665abc2f7fed5ea39d95e7fe4417d2be9ead693fa61fc413c685dd153dadc8fc90ebf7029391453b09ae61a84aa65f32cfd6646025ced1726070b48b8fb85a647f3e89486597de66c943986397a85a67508744df5e369a63d9e470efd306c4c0942abb762918d5638638ffb6e9a3ee43db67094c030fd70ae6aa91c7ffb059843aac0f7157e6c99415cdb87cf9250a8f211a650785a1eb8b499461eb76490dc616317ed48c77087501e16bdfd6d7ee4a0ffa5ed93ff0102d4097f81366e23201ff9fee563b23fc3675c6085226b815e710f79317b7f82a1abd764a241ecf827a66cb1c4ca8a8d7ff4097d9c18e3e17087f5ad9d799fb0cbe1200a980f99a2100662f4b8b75bb757fd1d315b404a2d3680b9944de730b72afd3e0be81fecf963a9795ef74deeaf24044801b0561b30bc862dec037aabf7df19c74d530f9fe146fce3052ffba76851f1fa371d9698ab5836e65bfe0809497416d326e784e737a128095bcaac7e2c93cccbbbdf2783dae797febcf2409edcd14df81d36503f111f6ef29c29bf6ee87dc99cbf4fcafa1ddee3244021d8297a87b017a6c8abcd9daaa27e39d9b6cd27c9a3afeb5cfa15fd3d66bca", 0x1000}, {&(0x7f0000000180)="3226a8aa0429de53bd9a4c942b5fb74e344bf7d8c9c93805dd37d0470157b55429155cfe3163", 0x26}], 0x6, &(0x7f0000001640)=[{0xf8, 0x3a, 0x1, "64c82bbfa08d3fc23b13f656679c667c3eb00134f4e7c55c3d8581b6683a273d562c9d9cc082335fbae683a078e89bf2d16bf2c81cd2dc1290d9110c1fb757dca8ebf630d14ee723c7376915b46ad4fc1d0b89a777564ced89261dcf86c7dc5277b72b1439d5af7e11d5ca8a7676d41a9f4c179b121bde2a943ecddf3834d65430b290213218c0ead463c98cf68fc2a9d1fba0413a3f6477ee63b64e29d6c341291d0b6324e0cd5389e86ac760e74d4d5784b509065c2cbb8c68b460fe72be9add043217402b316cc3fbd20635557faaed88d5651f6801274004eafb95ace1aabb1282410076b49d7862"}, {0xc4, 0x119, 0x0, "ad5cf8b462aeb210c8cee38e0d3c6b9dd5da113885b7bfbd97c78affcb687dd15c1587ef7f04e224367d7692e4a9d22051bd0fcf9ec02222b5f60980d7edaea445f72308b02cc9702a48d13b27dc2ea201c7bb79ab371a03706fdf4115f501aebeab4aa1b0f6b025c422212a8d99c786d271524d159f04fb0a86903f09484ae9cea4eeea041eb52209084a408e0c1494d62f81265bc9aeb05fb24dbccc3a10ddaf32afac099c1d24af99223440c64b9971221c20d2f2"}, {0xcc, 0x10e, 0x1, "26c00e6a8c74c1eb9c0dfc4ca16ba42c132b78ad29c1c0ee168bde9b4302113c9d65c684df9f53d14c4af2b710742db40fbe049338f09f77396e504d02d7fd96663f6bc64c94b67f73f4464598bfa597416a36d25e8a9250ac34a06029473a206c763ae50ff1819a8fbdfab0a7766da7b0afd2223c133041db84b1c289bc739c58569b469fe5c17ad7091f1fdcd61e1276eecab0a05bee13b1cdc9c41262c6926a2c865c06eafa551666c547dd7c713f5fc0e03e897652eeab46d98a65b5"}, {0xcc, 0x118, 0x8, "e18d270827a53a1b55c16c0bbce13145fb1a1569f7e6e9bd80cd5f527443ed76e7c8c80226a1372ee938da2603558aa74bcc68a9fb1d18c2509d3755f6827122f51dcfd566bb9a2b0a3e5b21866b9f562a6aec358178c0d5dea34caac5eaab9451e018d42a05abe2383ea700c34416423502991c8dd3b557d21b2128740644295fa436b0354f24541a1c497122785042e7285545b8565a829b748177fe90f6564b7e3bd6b5a8f128a841dc594d1018c29f79b98f5d892128ba32f0d298f0b1"}], 0x354}, 0x80) pipe(&(0x7f0000000240)) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:48:01 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000100)=@xdp={0x2c, 0x0, 0x0, 0x23}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000340)="eb2f21460f123d067d504ddb0344130e9ea793a1637e47df5ed04c5c5beffc223c05790f2a17917ac55d50fb44ef7a4397a30d884e55bcedaa8afd429d93622d2a6b772f92973d4e2929aec995f6d4d8d379712ae6099f1b54db44fa6c6ecf1365338729604eeef1e2afa9b32c26ff60f4bf3d0b46fcd80964bc9e08ac804436253c1da741597696a5f29829f0716e973c192a870b6f8a18b037dffe9571a2011db7b16d5e4893d39be99938ff3a808999", 0xb1}, {&(0x7f0000000400)="89eb9f3270fad4d1fada009008e12360f8a6d9364e052f67c20c576ad470753d548a5251b9ec1fe207b2420b23da96f1f3d062cb7aaf4eeeb66448cf32eaa82559ef723ed1493fbf61e14d687873607348997e7649c7000fe405a9800409229316c46ae902128107d59fc0e26573ebf38feab14d522365c41e88faab88a7ff681e6d1d02ee061bf70bdd2203663399fb186e2513413534c988ffdacfb04fb464aa66e22e0e9506321aabe30ee09bdfad3d0386271a78c9dfd7d671094fb219552d7065539de5c7c562e1fd9b57ee9db8c20e530ac153cb5a6a199f969dd606e69e098ecf3a4f6ece1555957412cf7ad9", 0xf0}, {&(0x7f0000000500)="a51edf5d9b1be434141032d153b51f4a66ce815dacd0ae62149eb6186181907b44e3a89883204d0c5163a5831f5140fb78100c0bee951b863d16bafa6d6d91597b48e051bc85636cb6805642eb8c26f50c092ce2677576", 0x57}, {&(0x7f0000000580)="6ec78b91c852516fd3fbacc5659012bc2314e05dd0c66f0674b9734fcd019f318427a5f792e0fbb75a10b56d2fd5d2e83bbeaa5e7ff6559cbff4ac3f743e0f855e2a6d560f50ec78851ead7e42780cdb02919968ad3cd7607a8527757fb1c5fed196c376e86d607e5c700a772eb981b5733d422c", 0x74}, {&(0x7f0000000600)="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", 0x1000}, {&(0x7f0000000180)="3226a8aa0429de53bd9a4c942b5fb74e344bf7d8c9c93805dd37d0470157b55429155cfe3163", 0x26}], 0x6, &(0x7f0000001640)=[{0xf8, 0x3a, 0x1, "64c82bbfa08d3fc23b13f656679c667c3eb00134f4e7c55c3d8581b6683a273d562c9d9cc082335fbae683a078e89bf2d16bf2c81cd2dc1290d9110c1fb757dca8ebf630d14ee723c7376915b46ad4fc1d0b89a777564ced89261dcf86c7dc5277b72b1439d5af7e11d5ca8a7676d41a9f4c179b121bde2a943ecddf3834d65430b290213218c0ead463c98cf68fc2a9d1fba0413a3f6477ee63b64e29d6c341291d0b6324e0cd5389e86ac760e74d4d5784b509065c2cbb8c68b460fe72be9add043217402b316cc3fbd20635557faaed88d5651f6801274004eafb95ace1aabb1282410076b49d7862"}, {0xc4, 0x119, 0x0, "ad5cf8b462aeb210c8cee38e0d3c6b9dd5da113885b7bfbd97c78affcb687dd15c1587ef7f04e224367d7692e4a9d22051bd0fcf9ec02222b5f60980d7edaea445f72308b02cc9702a48d13b27dc2ea201c7bb79ab371a03706fdf4115f501aebeab4aa1b0f6b025c422212a8d99c786d271524d159f04fb0a86903f09484ae9cea4eeea041eb52209084a408e0c1494d62f81265bc9aeb05fb24dbccc3a10ddaf32afac099c1d24af99223440c64b9971221c20d2f2"}, {0xcc, 0x10e, 0x1, "26c00e6a8c74c1eb9c0dfc4ca16ba42c132b78ad29c1c0ee168bde9b4302113c9d65c684df9f53d14c4af2b710742db40fbe049338f09f77396e504d02d7fd96663f6bc64c94b67f73f4464598bfa597416a36d25e8a9250ac34a06029473a206c763ae50ff1819a8fbdfab0a7766da7b0afd2223c133041db84b1c289bc739c58569b469fe5c17ad7091f1fdcd61e1276eecab0a05bee13b1cdc9c41262c6926a2c865c06eafa551666c547dd7c713f5fc0e03e897652eeab46d98a65b5"}, {0xcc, 0x118, 0x8, "e18d270827a53a1b55c16c0bbce13145fb1a1569f7e6e9bd80cd5f527443ed76e7c8c80226a1372ee938da2603558aa74bcc68a9fb1d18c2509d3755f6827122f51dcfd566bb9a2b0a3e5b21866b9f562a6aec358178c0d5dea34caac5eaab9451e018d42a05abe2383ea700c34416423502991c8dd3b557d21b2128740644295fa436b0354f24541a1c497122785042e7285545b8565a829b748177fe90f6564b7e3bd6b5a8f128a841dc594d1018c29f79b98f5d892128ba32f0d298f0b1"}], 0x354}, 0x80) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:48:02 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:48:02 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:48:03 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:48:03 executing program 1: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_JOIN_OCB(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r0, 0x0, 0x70bd28, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x31}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000010) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f0000000140)=""/63, &(0x7f0000000180)=0x3f) shmctl$SHM_LOCK(0x0, 0xb) r1 = fsmount(0xffffffffffffffff, 0x0, 0x93) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000001c0)={0x0, @private=0xa010101, @empty}, 0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000200)={{{@in=@private, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@empty}}, &(0x7f0000000300)=0xe4) keyctl$chown(0x4, 0x0, r2, 0xee01) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000380)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_GET_STATION(r1, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x38, r0, 0x800, 0x70bd2d, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x1f}}}}, [@NL80211_ATTR_STA_PLINK_ACTION={0x5}, @NL80211_ATTR_PEER_AID={0x6, 0xb5, 0x2b7}]}, 0x38}, 0x1, 0x0, 0x0, 0x4044001}, 0x4004000) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000480)=0x23, 0x4) prctl$PR_GET_THP_DISABLE(0x2a) r4 = syz_open_dev$vcsu(&(0x7f00000004c0)='/dev/vcsu#\x00', 0x1000, 0x420000) getsockopt$inet6_int(r1, 0x29, 0xce, &(0x7f0000000500), &(0x7f0000000540)=0x4) ioctl$DRM_IOCTL_AGP_INFO(r4, 0x80206433, &(0x7f0000000580)=""/87) r5 = open_tree(r4, &(0x7f0000000600)='./file0\x00', 0x88000) ioctl$SNDRV_CTL_IOCTL_PVERSION(r5, 0x80045500, &(0x7f0000000640)) r6 = syz_open_dev$vcsa(&(0x7f0000000680)='/dev/vcsa#\x00', 0x6, 0x400000) sendto$x25(r6, &(0x7f00000006c0)="71ef63d2bc048ad256d99b2ecf9f12c96c67869bbca9887ecf56418f22ad4d87372701d7d76c7a1cd08286001f5ff3437dacfe7a43829e73801842a7af9e8d46357bd91168e0b706580fbafb69ab37e16a53c4e3fb11af268ff2c220f4dc3a3ebe0841748b48adeb0d573c8fc116bbb4d92cb6ae531621770920b52a7c0794ec863e72f98d7d3df4245602c8a5aa9710ae1f1dd62fd710bf32b8f38083f32aa29e303dd0b9ab3765a596fb8b9749db10df80ac6b5ed622046f2ae4a6dfab301981d157102228", 0xc6, 0x20004804, 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000800), 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x1c, 0x0, 0xe00, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004000}, 0x4800) 12:48:03 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:48:04 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:48:04 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:48:04 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:48:05 executing program 0: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:48:05 executing program 0: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 358.118282][ T8637] IPVS: ftp: loaded support on port[0] = 21 12:48:05 executing program 0: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 358.577293][ T8637] chnl_net:caif_netlink_parms(): no params data found 12:48:06 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 359.163642][ T8637] bridge0: port 1(bridge_slave_0) entered blocking state [ 359.171134][ T8637] bridge0: port 1(bridge_slave_0) entered disabled state [ 359.179673][ T8637] device bridge_slave_0 entered promiscuous mode [ 359.258103][ T8637] bridge0: port 2(bridge_slave_1) entered blocking state [ 359.265557][ T8637] bridge0: port 2(bridge_slave_1) entered disabled state [ 359.275246][ T8637] device bridge_slave_1 entered promiscuous mode [ 359.428766][ T8637] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 359.469462][ T8637] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 359.526492][ T8637] team0: Port device team_slave_0 added [ 359.540046][ T8637] team0: Port device team_slave_1 added [ 359.592256][ T8637] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 359.599343][ T8637] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 359.625686][ T8637] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 359.650351][ T8637] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 359.658522][ T8637] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 359.684823][ T8637] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 359.758423][ T8637] device hsr_slave_0 entered promiscuous mode [ 359.769100][ T8637] device hsr_slave_1 entered promiscuous mode [ 359.784061][ T8637] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 359.791836][ T8637] Cannot create hsr debugfs directory 12:48:07 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 360.111032][ T746] Bluetooth: hci1: command 0x0409 tx timeout [ 360.202484][ T8637] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 360.242121][ T8637] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 360.275810][ T8637] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 360.307231][ T8637] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 360.755116][ T8637] 8021q: adding VLAN 0 to HW filter on device bond0 [ 360.800767][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 360.809780][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 360.837827][ T8637] 8021q: adding VLAN 0 to HW filter on device team0 [ 360.866664][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 360.877363][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 360.886715][ T30] bridge0: port 1(bridge_slave_0) entered blocking state [ 360.894053][ T30] bridge0: port 1(bridge_slave_0) entered forwarding state [ 360.907207][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 360.930547][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 360.939955][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 360.949271][ T8487] bridge0: port 2(bridge_slave_1) entered blocking state [ 360.956755][ T8487] bridge0: port 2(bridge_slave_1) entered forwarding state [ 361.011617][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 361.022663][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 361.033835][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 361.044476][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 361.102125][ T8637] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 361.113013][ T8637] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 361.135480][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 361.145670][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 361.156298][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 361.167137][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 361.176714][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 361.187126][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 12:48:08 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 361.197012][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 361.312655][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 361.373863][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 361.381945][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 361.436526][ T8637] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 361.558804][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 361.569159][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 361.639561][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 361.649305][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 361.677809][ T8637] device veth0_vlan entered promiscuous mode [ 361.688982][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 361.698490][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 361.746342][ T8637] device veth1_vlan entered promiscuous mode [ 361.829043][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 361.839419][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 361.848926][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 361.858975][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 361.886861][ T8637] device veth0_macvtap entered promiscuous mode [ 361.910026][ T8637] device veth1_macvtap entered promiscuous mode [ 361.974470][ T8637] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 361.985418][ T8637] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 361.999267][ T8637] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 362.009621][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 362.019767][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 362.029395][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 362.039586][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 362.066915][ T8637] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 362.077629][ T8637] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 362.092485][ T8637] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 362.103457][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 362.115163][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 362.142978][ T8637] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 362.151935][ T8637] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 362.161305][ T8637] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 362.170143][ T8637] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 362.194325][ T8487] Bluetooth: hci1: command 0x041b tx timeout 12:48:09 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 362.519949][ T1318] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 362.528827][ T1318] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 362.539377][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 362.662434][ T656] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 362.670346][ T656] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 362.679944][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 12:48:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x15, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x63, 0x11, 0x30}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x76}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x74) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e23, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}, 0x0, 0x0, 0x9, 0x0, "24603892460afb8947b4087dd8ee2b19853e51a4c21b680bd5a9a2e94c19253e427798fe3fd058f27b8e21ad55059cd5939cb7afdc98a96f5b1d783eb386387993902b0b02f6eddf1f726d50c1135b4e"}, 0xd8) r0 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="5500000018007f5f14fe01b2a4a290930206040000001301020b04123900090035000c080100000019000b40060c1101020e22dc1338d54404139b84136ef75afb83de4411000500", 0x59}, {&(0x7f0000000300)="73005000d612119800ff03a9885e080904d8200166c87070018d6866cf97cd427156931ac34b993f5296118601eae5532f9542d492efd7bf0cb0ae99c455869b4cc73d031648ae559db2b330280e3c7a60ce6311775a0871914d0e1f2eb5c833c4c01a4eb09a84f0917df985479e886fc8467a7b2fe3e04022bc972058eb439c583d65d05700b171d76adfa454a1eb32afacaf76ebf1292e8a69f0b6b3c3e83ad22f560e917d11715b110619b35f7c8e6ee5448004eb10aa025905a512611244111c8ac91b0450952fadd68396cf18003daa4bba840000000000000000000094bca46494dba2c7b9cfc72d5cf54d0904229e2e7a1f00"/255, 0xff}], 0x2}, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x2, 0x4) 12:48:10 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x19, &(0x7f0000000080)=0x800, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x4) setsockopt$inet_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x303}, "eeb18b014090761e", "b444e7840aff87e7e856dded5d71a516dac23352bcd5a4f85d00", "ec4da567", "93002100"}, 0x38) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[], 0xd90f) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x11a8, 0x92840) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x19, &(0x7f0000000080)=0x800, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x4) setsockopt$inet_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x303}, "eeb18b014090761e", "b444e7840aff87e7e856dded5d71a516dac23352bcd5a4f85d00", "ec4da567", "93002100"}, 0x38) write$binfmt_misc(r2, &(0x7f0000000100)=ANY=[], 0xd90f) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x23}}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffff8, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x9000000) ppoll(&(0x7f0000000040)=[{r0}], 0x1, &(0x7f0000000080)={0x0, 0x3938700}, 0x0, 0x0) 12:48:10 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 364.271704][ T8487] Bluetooth: hci1: command 0x040f tx timeout 12:48:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_io_uring_complete(0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000040)={0x0, 0x71, "0f00e6fbcbf6ba26129ba73b7e74f10594f89667c44fc208a19137c01021756d83349dd4539d6d89b0b9b8a7ef7d34e9948ab6283272f615ce6db1bc5779775af9c8d640cecd43d2878396aa6ef1b2d6cf14d9a1c28aef745989836e6339e9e2cf0903993a2bc804ace88414d01ebc157a"}, &(0x7f00000000c0)=0x79) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=@ipv6_getanyicast={0x14, 0x3e, 0x0, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}}, 0x0) 12:48:11 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000), 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000005c0)={0x0, 0x9, 0x0, 0x7fff}, 0x10) 12:48:11 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:48:12 executing program 1: syz_usb_connect(0x0, 0x52, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x28, 0xaa, 0xc2, 0x8, 0x403, 0xff38, 0x7396, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x40, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x1f, 0x28, 0x42, 0x0, [@uac_control={{}, [@mixer_unit={0x5, 0x24, 0x4, 0x2}]}], [{{0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [@uac_iso={0x7}, @generic={0x10, 0x0, "97629f41833cebbf8678198dab93"}]}}]}}]}}]}}, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f00000000c0)={0x20, 0x0, r1, {0x4, 0x0, 0xffff, 0x49}}, 0x20) [ 365.380934][ T8486] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 365.620948][ T8486] usb 2-1: Using ep0 maxpacket: 8 12:48:12 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 365.763628][ T8486] usb 2-1: config 0 has an invalid interface number: 2 but max is 0 [ 365.772096][ T8486] usb 2-1: config 0 has 2 interfaces, different from the descriptor's value: 1 [ 365.781521][ T8486] usb 2-1: config 0 has no interface number 1 [ 365.787821][ T8486] usb 2-1: config 0 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 365.801328][ T8486] usb 2-1: config 0 interface 2 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 9 [ 365.983236][ T8486] usb 2-1: New USB device found, idVendor=0403, idProduct=ff38, bcdDevice=73.96 [ 365.992661][ T8486] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 366.001364][ T8486] usb 2-1: Product: syz [ 366.005692][ T8486] usb 2-1: Manufacturer: syz [ 366.010449][ T8486] usb 2-1: SerialNumber: syz [ 366.075698][ T8486] usb 2-1: config 0 descriptor?? [ 366.135341][ T8486] ftdi_sio 2-1:0.0: FTDI USB Serial Device converter detected [ 366.144823][ T8486] usb 2-1: Detected FT2232C [ 366.351785][ T8487] Bluetooth: hci1: command 0x0419 tx timeout [ 366.371144][ T8486] ftdi_sio ttyUSB0: Unable to read latency timer: -71 [ 366.397747][ T8486] ftdi_sio ttyUSB0: Unable to write latency timer: -71 [ 366.423586][ T8486] usb 2-1: FTDI USB Serial Device converter now attached to ttyUSB0 [ 366.437352][ T8486] ftdi_sio 2-1:0.2: FTDI USB Serial Device converter detected [ 366.446291][ T8486] usb 2-1: Detected FT2232C [ 366.535656][ T8486] ftdi_sio ttyUSB1: Unable to read latency timer: -71 [ 366.567297][ T8486] ftdi_sio ttyUSB1: Unable to write latency timer: -71 [ 366.602527][ T8486] usb 2-1: FTDI USB Serial Device converter now attached to ttyUSB1 [ 366.645901][ T8486] usb 2-1: USB disconnect, device number 2 [ 366.680045][ T8486] ftdi_sio ttyUSB0: FTDI USB Serial Device converter now disconnected from ttyUSB0 [ 366.690798][ T8486] ftdi_sio 2-1:0.0: device disconnected [ 366.796783][ T8486] ftdi_sio ttyUSB1: FTDI USB Serial Device converter now disconnected from ttyUSB1 [ 366.807406][ T8486] ftdi_sio 2-1:0.2: device disconnected 12:48:14 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 367.273554][ T8486] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 367.550974][ T8486] usb 2-1: Using ep0 maxpacket: 8 [ 367.681736][ T8486] usb 2-1: config 0 has an invalid interface number: 2 but max is 0 [ 367.689941][ T8486] usb 2-1: config 0 has 2 interfaces, different from the descriptor's value: 1 [ 367.699346][ T8486] usb 2-1: config 0 has no interface number 1 [ 367.705789][ T8486] usb 2-1: config 0 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 367.719501][ T8486] usb 2-1: config 0 interface 2 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 9 12:48:15 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 367.921044][ T8486] usb 2-1: New USB device found, idVendor=0403, idProduct=ff38, bcdDevice=73.96 [ 367.930279][ T8486] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 367.938678][ T8486] usb 2-1: Product: syz [ 367.943159][ T8486] usb 2-1: Manufacturer: syz [ 367.948245][ T8486] usb 2-1: SerialNumber: syz [ 368.003197][ T8486] usb 2-1: config 0 descriptor?? 12:48:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000940)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x38, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r1}, @RTA_GATEWAY={0x14, 0x7, @loopback}]}, 0x38}}, 0x0) [ 368.222734][ T8486] usb 2-1: can't set config #0, error -71 [ 368.242900][ T8486] usb 2-1: USB disconnect, device number 3 12:48:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x100000, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x7ffd, 0x0) mknodat(r0, &(0x7f00000001c0)='./file0/file0\x00', 0x8000, 0xfffffffa) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="2e000000f0ffffff07696c653000893e17be921a7f4c3eec19176f2a41151524e33177b6166402f954ff4c6393a2930d81a9c320c4bfd1381b03a2af7ee65b7f04000000ff675e5a1afbc101b5e78fd331cef54133d66ce989bf16a22b44cbb4d6914cc15b5885d2cbb81d875cb5026798a1a5e1bb0429e5f42f74f0cf26f7b6"], &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x201000, 0x0) mount(&(0x7f00000001c0)=ANY=[], &(0x7f0000000140)='./file0/file0\x00', 0x0, 0xf402, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x80000, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 12:48:16 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) flistxattr(r0, &(0x7f00000000c0)=""/39, 0x27) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000300)=""/247, 0xf7}], 0x1) getdents64(r0, 0x0, 0x48) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x38, 0x240000) ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000180)={0xfffffffffffff9be, 0x1f}) 12:48:16 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 369.249332][ T9007] EXT4-fs (loop1): Test dummy encryption mode enabled [ 369.256390][ T9007] EXT4-fs (loop1): filesystem is read-only [ 369.293599][ T9007] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 369.303969][ T9007] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 369.313988][ T9007] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 369.323902][ T9007] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 369.352447][ T9007] EXT4-fs error (device loop1): ext4_fill_super:4709: inode #2: comm syz-executor.1: iget: root inode unallocated [ 369.365837][ T9007] EXT4-fs (loop1): get root inode failed [ 369.371946][ T9007] EXT4-fs (loop1): mount failed [ 369.495220][ T9011] EXT4-fs (loop1): Test dummy encryption mode enabled [ 369.502453][ T9011] EXT4-fs (loop1): filesystem is read-only [ 369.520410][ T9011] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 369.530495][ T9011] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 369.540511][ T9011] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 369.550454][ T9011] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 369.651977][ T9011] EXT4-fs: failed to create workqueue [ 369.657464][ T9011] EXT4-fs (loop1): mount failed 12:48:17 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) flistxattr(r0, &(0x7f00000000c0)=""/39, 0x27) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000300)=""/247, 0xf7}], 0x1) getdents64(r0, 0x0, 0x48) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x38, 0x240000) ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000180)={0xfffffffffffff9be, 0x1f}) [ 369.999719][ T9026] EXT4-fs (loop1): Test dummy encryption mode enabled [ 370.006837][ T9026] EXT4-fs (loop1): filesystem is read-only [ 370.026310][ T9026] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 370.036497][ T9026] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 370.046494][ T9026] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 370.056377][ T9026] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 370.082503][ T9026] EXT4-fs error (device loop1): ext4_fill_super:4709: inode #2: comm syz-executor.1: iget: root inode unallocated [ 370.140660][ T9026] EXT4-fs (loop1): get root inode failed [ 370.146572][ T9026] EXT4-fs (loop1): mount failed 12:48:17 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) flistxattr(r0, &(0x7f00000000c0)=""/39, 0x27) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000300)=""/247, 0xf7}], 0x1) getdents64(r0, 0x0, 0x48) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x38, 0x240000) ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000180)={0xfffffffffffff9be, 0x1f}) 12:48:17 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 370.533068][ T9032] EXT4-fs (loop1): Test dummy encryption mode enabled [ 370.540053][ T9032] EXT4-fs (loop1): filesystem is read-only [ 370.572102][ T9032] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 370.582302][ T9032] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 370.592506][ T9032] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 370.602378][ T9032] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 370.732846][ T9032] EXT4-fs error (device loop1): ext4_fill_super:4709: inode #2: comm syz-executor.1: iget: root inode unallocated [ 370.770425][ T9032] EXT4-fs (loop1): get root inode failed [ 370.776549][ T9032] EXT4-fs (loop1): mount failed 12:48:18 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) flistxattr(r0, &(0x7f00000000c0)=""/39, 0x27) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000300)=""/247, 0xf7}], 0x1) getdents64(r0, 0x0, 0x48) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x38, 0x240000) ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000180)={0xfffffffffffff9be, 0x1f}) [ 371.133833][ T9043] EXT4-fs (loop1): Test dummy encryption mode enabled [ 371.140875][ T9043] EXT4-fs (loop1): filesystem is read-only [ 371.169605][ T9043] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 371.179853][ T9043] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 371.189980][ T9043] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 371.200101][ T9043] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 371.253376][ T9043] EXT4-fs error (device loop1): ext4_fill_super:4709: inode #2: comm syz-executor.1: iget: root inode unallocated [ 371.312784][ T9043] EXT4-fs (loop1): get root inode failed [ 371.318605][ T9043] EXT4-fs (loop1): mount failed 12:48:18 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) flistxattr(r0, &(0x7f00000000c0)=""/39, 0x27) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000300)=""/247, 0xf7}], 0x1) getdents64(r0, 0x0, 0x48) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x38, 0x240000) 12:48:18 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 371.783432][ T9051] EXT4-fs (loop1): Test dummy encryption mode enabled [ 371.790331][ T9051] EXT4-fs (loop1): filesystem is read-only [ 371.857957][ T9051] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 371.868026][ T9051] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 371.878292][ T9051] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 371.888227][ T9051] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 372.070226][ T9051] EXT4-fs error (device loop1): ext4_fill_super:4709: inode #2: comm syz-executor.1: iget: root inode unallocated [ 372.106852][ T9051] EXT4-fs (loop1): get root inode failed [ 372.112803][ T9051] EXT4-fs (loop1): mount failed 12:48:19 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) flistxattr(r0, &(0x7f00000000c0)=""/39, 0x27) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000300)=""/247, 0xf7}], 0x1) getdents64(r0, 0x0, 0x48) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 372.589174][ T9063] EXT4-fs (loop1): Test dummy encryption mode enabled [ 372.596310][ T9063] EXT4-fs (loop1): filesystem is read-only 12:48:19 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 372.702610][ T9063] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 372.712550][ T9063] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 372.722661][ T9063] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 372.732544][ T9063] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 372.854092][ T9063] EXT4-fs error (device loop1): ext4_fill_super:4709: inode #2: comm syz-executor.1: iget: root inode unallocated [ 372.900819][ T9063] EXT4-fs (loop1): get root inode failed [ 372.906782][ T9063] EXT4-fs (loop1): mount failed 12:48:20 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) flistxattr(r0, &(0x7f00000000c0)=""/39, 0x27) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000300)=""/247, 0xf7}], 0x1) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 373.295827][ T9073] EXT4-fs (loop1): Test dummy encryption mode enabled [ 373.302936][ T9073] EXT4-fs (loop1): filesystem is read-only [ 373.346606][ T9073] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 373.356949][ T9073] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 373.367029][ T9073] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 373.377319][ T9073] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 373.405022][ T9073] EXT4-fs error (device loop1): ext4_fill_super:4709: inode #2: comm syz-executor.1: iget: root inode unallocated [ 373.418887][ T9073] EXT4-fs (loop1): get root inode failed [ 373.424911][ T9073] EXT4-fs (loop1): mount failed 12:48:20 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) flistxattr(r0, &(0x7f00000000c0)=""/39, 0x27) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:20 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 373.873665][ T9080] EXT4-fs (loop1): Test dummy encryption mode enabled [ 373.881067][ T9080] EXT4-fs (loop1): filesystem is read-only [ 373.933939][ T9080] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 373.943935][ T9080] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 373.954182][ T9080] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 373.964059][ T9080] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) 12:48:21 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) flistxattr(r0, &(0x7f00000000c0)=""/39, 0x27) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000300)=""/247, 0xf7}], 0x1) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 374.110256][ T9080] EXT4-fs error (device loop1): ext4_fill_super:4709: inode #2: comm syz-executor.1: iget: root inode unallocated [ 374.128242][ T9080] EXT4-fs (loop1): get root inode failed [ 374.134360][ T9080] EXT4-fs (loop1): mount failed 12:48:22 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:48:22 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) flistxattr(r0, &(0x7f00000000c0)=""/39, 0x27) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 375.235634][ T9096] EXT4-fs (loop1): Test dummy encryption mode enabled [ 375.242764][ T9096] EXT4-fs (loop1): filesystem is read-only [ 375.294637][ T9096] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 375.304642][ T9096] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 375.317551][ T9096] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 375.327415][ T9096] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 375.513499][ T9096] EXT4-fs error (device loop1): ext4_fill_super:4709: inode #2: comm syz-executor.1: iget: root inode unallocated [ 375.536990][ T9096] EXT4-fs (loop1): get root inode failed [ 375.543409][ T9096] EXT4-fs (loop1): mount failed 12:48:22 executing program 1: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 375.897336][ T9103] EXT4-fs (loop1): Test dummy encryption mode enabled [ 375.904378][ T9103] EXT4-fs (loop1): filesystem is read-only 12:48:23 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 375.964960][ T9103] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 375.975061][ T9103] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 375.985231][ T9103] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 375.995101][ T9103] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 376.127681][ T9090] IPVS: ftp: loaded support on port[0] = 21 [ 376.283608][ T9103] EXT4-fs error (device loop1): ext4_fill_super:4709: inode #2: comm syz-executor.1: iget: root inode unallocated [ 376.312127][ T9103] EXT4-fs (loop1): get root inode failed [ 376.318067][ T9103] EXT4-fs (loop1): mount failed 12:48:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 376.931029][ T9090] chnl_net:caif_netlink_parms(): no params data found [ 377.194737][ T9233] EXT4-fs (loop1): Test dummy encryption mode enabled [ 377.202522][ T9233] EXT4-fs (loop1): filesystem is read-only [ 377.218394][ T9233] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 377.228983][ T9233] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 377.239749][ T9233] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 377.249948][ T9233] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 377.324193][ T9233] EXT4-fs error (device loop1): ext4_fill_super:4709: inode #2: comm syz-executor.1: iget: root inode unallocated [ 377.373057][ T9233] EXT4-fs (loop1): get root inode failed [ 377.379081][ T9233] EXT4-fs (loop1): mount failed [ 377.398078][ T9090] bridge0: port 1(bridge_slave_0) entered blocking state [ 377.406194][ T9090] bridge0: port 1(bridge_slave_0) entered disabled state [ 377.416270][ T9090] device bridge_slave_0 entered promiscuous mode 12:48:24 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 377.484975][ T9090] bridge0: port 2(bridge_slave_1) entered blocking state [ 377.492668][ T9090] bridge0: port 2(bridge_slave_1) entered disabled state [ 377.502478][ T9090] device bridge_slave_1 entered promiscuous mode 12:48:24 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 377.687305][ T9090] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 377.738173][ T9090] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 377.811298][ T9090] team0: Port device team_slave_0 added [ 377.827335][ T9090] team0: Port device team_slave_1 added [ 377.895774][ T9090] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 377.903331][ T9090] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 377.931361][ T9090] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 377.951769][ T9090] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 377.959044][ T9090] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 377.986475][ T9090] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 378.069793][ T9090] device hsr_slave_0 entered promiscuous mode [ 378.112511][ T2977] Bluetooth: hci2: command 0x0409 tx timeout [ 378.138556][ T9090] device hsr_slave_1 entered promiscuous mode 12:48:25 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 378.194160][ T9090] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 378.202101][ T9090] Cannot create hsr debugfs directory 12:48:25 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:25 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 378.916975][ T9090] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 378.954530][ T9090] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 379.007947][ T9090] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 379.075553][ T9090] netdevsim netdevsim2 netdevsim3: renamed from eth3 12:48:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', 0x0, 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 379.792907][ T9090] 8021q: adding VLAN 0 to HW filter on device bond0 [ 379.864473][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 379.873996][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 379.922440][ T9090] 8021q: adding VLAN 0 to HW filter on device team0 [ 379.980103][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 379.990141][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 379.999643][ T8486] bridge0: port 1(bridge_slave_0) entered blocking state [ 380.007078][ T8486] bridge0: port 1(bridge_slave_0) entered forwarding state [ 380.102392][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 380.112012][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 380.123084][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 380.132889][ T8486] bridge0: port 2(bridge_slave_1) entered blocking state [ 380.140314][ T8486] bridge0: port 2(bridge_slave_1) entered forwarding state [ 380.150057][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 380.161002][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 380.192240][ T8487] Bluetooth: hci2: command 0x041b tx timeout [ 380.268729][ T9090] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 380.279700][ T9090] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 380.309883][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 380.320445][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 380.331544][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 380.341935][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 380.352320][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 380.361927][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 380.372308][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 380.382011][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 380.505978][ T3125] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 380.516164][ T3125] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 380.525485][ T3125] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 380.533836][ T3125] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 380.576680][ T9090] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 380.756392][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 380.767640][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 380.888224][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 380.898344][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 380.935227][ T9090] device veth0_vlan entered promiscuous mode [ 380.952799][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 380.962278][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 380.997370][ T9090] device veth1_vlan entered promiscuous mode [ 381.097147][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 381.107689][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 381.137781][ T9090] device veth0_macvtap entered promiscuous mode [ 381.182739][ T9090] device veth1_macvtap entered promiscuous mode [ 381.236055][ T9090] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 381.249208][ T9090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 381.260864][ T9090] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 381.271963][ T9090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 381.285675][ T9090] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 381.293627][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 381.303766][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 381.313678][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 381.323821][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 381.367161][ T9090] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 381.378200][ T9090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 381.389479][ T9090] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 381.401286][ T9090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 381.415049][ T9090] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 381.431185][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 381.441658][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 381.485107][ T9090] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 381.495227][ T9090] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 381.504958][ T9090] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 381.514052][ T9090] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 381.886433][ T8886] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 381.894637][ T8886] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 381.907481][ T746] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 382.038752][ T8886] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 382.046912][ T8886] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 382.056740][ T746] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 382.272782][ T746] Bluetooth: hci2: command 0x040f tx timeout [ 382.315805][ T9382] EXT4-fs (loop2): Test dummy encryption mode enabled [ 382.322923][ T9382] EXT4-fs (loop2): filesystem is read-only [ 382.352627][ T9382] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 382.362810][ T9382] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 382.373425][ T9382] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 382.383388][ T9382] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 382.505085][ T9382] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 382.538101][ T9382] EXT4-fs (loop2): get root inode failed [ 382.544073][ T9382] EXT4-fs (loop2): mount failed 12:48:29 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) flistxattr(r0, &(0x7f00000000c0)=""/39, 0x27) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000300)=""/247, 0xf7}], 0x1) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', 0x0, 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:29 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc", 0x13}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 383.029545][ T9396] EXT4-fs (loop2): Test dummy encryption mode enabled [ 383.037299][ T9396] EXT4-fs (loop2): filesystem is read-only 12:48:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', 0x0, 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 383.175963][ T9396] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 383.186306][ T9396] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 383.196439][ T9396] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 383.208218][ T9396] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 383.317126][ T9396] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 383.337743][ T9396] EXT4-fs (loop2): get root inode failed [ 383.343778][ T9396] EXT4-fs (loop2): mount failed 12:48:30 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) flistxattr(r0, &(0x7f00000000c0)=""/39, 0x27) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000300)=""/247, 0xf7}], 0x1) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:31 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc", 0x13}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 383.877209][ T9408] EXT4-fs (loop1): Test dummy encryption mode enabled [ 383.884268][ T9408] EXT4-fs (loop1): filesystem is read-only [ 383.886710][ T9409] EXT4-fs (loop2): Test dummy encryption mode enabled [ 383.897613][ T9409] EXT4-fs (loop2): filesystem is read-only [ 383.954228][ T9408] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 383.982175][ T9409] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 383.992357][ T9409] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 384.002352][ T9409] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 384.012197][ T9409] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 384.121477][ T9409] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 384.214433][ T9409] EXT4-fs (loop2): get root inode failed [ 384.220241][ T9409] EXT4-fs (loop2): mount failed 12:48:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 384.350739][ T746] Bluetooth: hci2: command 0x0419 tx timeout 12:48:31 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) flistxattr(r0, &(0x7f00000000c0)=""/39, 0x27) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 384.569346][ T9421] EXT4-fs (loop1): Test dummy encryption mode enabled [ 384.576325][ T9421] EXT4-fs (loop1): filesystem is read-only [ 384.587728][ T9421] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:48:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 384.845439][ T9425] EXT4-fs (loop2): Test dummy encryption mode enabled [ 384.852537][ T9425] EXT4-fs (loop2): filesystem is read-only [ 384.902842][ T9425] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 384.912905][ T9425] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 384.923066][ T9425] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 384.933374][ T9425] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 385.023045][ T9428] EXT4-fs (loop1): Test dummy encryption mode enabled [ 385.029954][ T9428] EXT4-fs (loop1): filesystem is read-only [ 385.050650][ T9425] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 385.080638][ T9428] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 385.110054][ T9425] EXT4-fs (loop2): get root inode failed [ 385.116309][ T9425] EXT4-fs (loop2): mount failed 12:48:32 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc", 0x13}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:48:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:32 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) flistxattr(r0, &(0x7f00000000c0)=""/39, 0x27) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 385.620583][ T9439] EXT4-fs (loop2): Test dummy encryption mode enabled [ 385.627648][ T9439] EXT4-fs (loop2): filesystem is read-only [ 385.645236][ T9439] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 385.655364][ T9439] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 385.666913][ T9439] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 385.677231][ T9439] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 385.692070][ T9439] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 385.720980][ T9439] EXT4-fs (loop2): get root inode failed [ 385.726710][ T9439] EXT4-fs (loop2): mount failed 12:48:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:33 executing program 2: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 386.203746][ T9448] EXT4-fs (loop2): Test dummy encryption mode enabled [ 386.210826][ T9448] EXT4-fs (loop2): filesystem is read-only [ 386.290118][ T9448] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 386.300247][ T9448] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 386.310646][ T9448] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 386.320414][ T9448] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) 12:48:33 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d", 0x1c}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 386.479298][ T9448] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 386.508916][ T9448] EXT4-fs (loop2): get root inode failed [ 386.514921][ T9448] EXT4-fs (loop2): mount failed 12:48:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 386.955187][ T9459] EXT4-fs (loop2): Test dummy encryption mode enabled [ 386.962248][ T9459] EXT4-fs (loop2): filesystem is read-only [ 386.975200][ T9459] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 386.985300][ T9459] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 386.996580][ T9459] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 387.007065][ T9459] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 387.018083][ T9459] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 387.031770][ T9459] EXT4-fs (loop2): get root inode failed [ 387.037619][ T9459] EXT4-fs (loop2): mount failed 12:48:34 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 387.370256][ T9466] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 12:48:34 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d", 0x1c}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:48:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:35 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 388.092943][ T9478] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 12:48:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:35 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 388.439676][ T9487] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 12:48:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', 0x0, 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:36 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d", 0x1c}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 389.085903][ T9496] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 12:48:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', 0x0, 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 389.614291][ T9508] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 12:48:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', 0x0, 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 390.123103][ T9518] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 12:48:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280), 0x0, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:37 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137", 0x21}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:48:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 390.559515][ T9528] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 390.685636][ T9532] EXT4-fs (loop2): Test dummy encryption mode enabled [ 390.692753][ T9532] EXT4-fs (loop2): filesystem is read-only [ 390.747300][ T9532] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) 12:48:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280), 0x0, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 391.187391][ T9538] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 391.304781][ T9541] EXT4-fs (loop2): Test dummy encryption mode enabled [ 391.313034][ T9541] EXT4-fs (loop2): filesystem is read-only [ 391.385622][ T9541] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) 12:48:38 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137", 0x21}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:48:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280), 0x0, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 391.825454][ T9549] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 12:48:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f465", 0x33, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 392.075581][ T9554] EXT4-fs (loop2): Test dummy encryption mode enabled [ 392.082588][ T9554] EXT4-fs (loop2): filesystem is read-only [ 392.135317][ T9554] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) 12:48:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 392.471985][ T9559] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 12:48:39 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137", 0x21}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:48:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f465", 0x33, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 392.990050][ T9568] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 12:48:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f465", 0x33, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 393.369657][ T9575] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 12:48:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001", 0x4d, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:41 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e", 0x23}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 394.010787][ T9583] EXT4-fs (loop1): invalid first ino: 0 12:48:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001", 0x4d, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 394.235374][ T9589] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 12:48:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 394.540172][ T9594] EXT4-fs (loop1): invalid first ino: 0 12:48:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001", 0x4d, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 394.829637][ T9599] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 12:48:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:42 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e", 0x23}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 395.276198][ T9603] EXT4-fs (loop1): invalid first ino: 0 12:48:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002", 0x5a, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 395.558175][ T9610] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 395.686778][ T9614] EXT4-fs (loop1): Test dummy encryption mode enabled 12:48:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 395.728706][ T9614] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 395.738854][ T9614] EXT4-fs (loop1): group descriptors corrupted! [ 395.883900][ T9619] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 12:48:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002", 0x5a, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 396.303198][ T9625] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 396.312272][ T9626] EXT4-fs (loop1): Test dummy encryption mode enabled [ 396.336772][ T9626] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 396.346793][ T9626] EXT4-fs (loop1): group descriptors corrupted! 12:48:43 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e", 0x23}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:48:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002", 0x5a, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 396.925974][ T9635] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 397.049777][ T9639] EXT4-fs (loop1): Test dummy encryption mode enabled [ 397.116761][ T9639] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 397.127491][ T9639] EXT4-fs (loop1): group descriptors corrupted! 12:48:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280), 0x0, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000", 0x60, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:44 executing program 3: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 397.593264][ T9646] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 12:48:45 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e37", 0x24}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:48:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280), 0x0, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 398.148888][ T9652] EXT4-fs (loop1): Test dummy encryption mode enabled [ 398.183943][ T9652] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 398.194086][ T9652] EXT4-fs (loop1): group descriptors corrupted! 12:48:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000", 0x60, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 398.598022][ T9658] EXT4-fs (loop1): Test dummy encryption mode enabled [ 398.655418][ T9658] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 398.665757][ T9658] EXT4-fs (loop1): group descriptors corrupted! [ 398.872607][ T9664] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 12:48:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000", 0x60, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280), 0x0, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:46 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e37", 0x24}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 399.376024][ T9669] EXT4-fs (loop1): Test dummy encryption mode enabled [ 399.434071][ T9669] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 399.444156][ T9669] EXT4-fs (loop1): group descriptors corrupted! [ 399.613906][ T9673] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 12:48:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400", 0x63, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f465", 0x33, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 399.880062][ T9680] EXT4-fs (loop1): Test dummy encryption mode enabled [ 399.904323][ T9680] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 399.914265][ T9680] EXT4-fs (loop1): group descriptors corrupted! [ 400.072269][ T9685] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 12:48:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400", 0x63, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f465", 0x33, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 400.378952][ T9690] EXT4-fs (loop1): Test dummy encryption mode enabled [ 400.528150][ T9690] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 400.528275][ T9698] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 400.538307][ T9690] EXT4-fs (loop1): group descriptors corrupted! 12:48:47 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e37", 0x24}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 400.616490][ T9667] IPVS: ftp: loaded support on port[0] = 21 [ 401.528712][ T9667] chnl_net:caif_netlink_parms(): no params data found [ 401.854223][ T9667] bridge0: port 1(bridge_slave_0) entered blocking state [ 401.861807][ T9667] bridge0: port 1(bridge_slave_0) entered disabled state [ 401.871653][ T9667] device bridge_slave_0 entered promiscuous mode [ 401.946972][ T9667] bridge0: port 2(bridge_slave_1) entered blocking state [ 401.954366][ T9667] bridge0: port 2(bridge_slave_1) entered disabled state [ 401.964260][ T9667] device bridge_slave_1 entered promiscuous mode [ 402.100143][ T9667] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 402.128816][ T9667] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 402.229775][ T9667] team0: Port device team_slave_0 added [ 402.277760][ T9667] team0: Port device team_slave_1 added [ 402.384875][ T9667] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 402.392680][ T9667] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 402.420002][ T9667] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 402.516967][ T8487] Bluetooth: hci3: command 0x0409 tx timeout [ 402.646627][ T9667] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 402.654128][ T9667] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 402.682118][ T9667] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 402.944136][ T9667] device hsr_slave_0 entered promiscuous mode [ 402.981964][ T9667] device hsr_slave_1 entered promiscuous mode [ 403.033286][ T9667] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 403.041152][ T9667] Cannot create hsr debugfs directory [ 403.655095][ T9667] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 403.712861][ T9667] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 403.779520][ T9667] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 403.819121][ T9667] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 404.396612][ T9667] 8021q: adding VLAN 0 to HW filter on device bond0 [ 404.488950][ T746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 404.498528][ T746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 404.533430][ T9667] 8021q: adding VLAN 0 to HW filter on device team0 [ 404.577289][ T746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 404.588285][ T746] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 404.597738][ T746] bridge0: port 1(bridge_slave_0) entered blocking state [ 404.605041][ T746] bridge0: port 1(bridge_slave_0) entered forwarding state [ 404.605175][ T30] Bluetooth: hci3: command 0x041b tx timeout [ 404.723580][ T746] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 404.733143][ T746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 404.743451][ T746] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 404.752834][ T746] bridge0: port 2(bridge_slave_1) entered blocking state [ 404.760063][ T746] bridge0: port 2(bridge_slave_1) entered forwarding state [ 404.769259][ T746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 404.780511][ T746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 404.895291][ T746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 404.905981][ T746] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 404.918742][ T746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 404.929157][ T746] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 405.013948][ T746] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 405.025997][ T746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 405.035900][ T746] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 405.045525][ T746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 405.055293][ T746] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 405.073014][ T9667] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 405.225034][ T9472] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 405.232961][ T9472] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 405.282298][ T9667] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 405.424840][ T9472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 405.434918][ T9472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 405.554560][ T9472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 405.564246][ T9472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 405.601863][ T9667] device veth0_vlan entered promiscuous mode [ 405.621738][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 405.631620][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 405.707558][ T9667] device veth1_vlan entered promiscuous mode [ 405.886066][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 405.895781][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 405.905681][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 405.917158][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 405.940312][ T9667] device veth0_macvtap entered promiscuous mode [ 405.984602][ T9667] device veth1_macvtap entered promiscuous mode [ 406.127889][ T9667] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 406.138820][ T9667] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 406.149333][ T9667] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 406.160412][ T9667] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 406.170446][ T9667] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 406.181132][ T9667] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 406.195053][ T9667] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 406.208610][ T9472] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 406.218714][ T9472] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 406.228539][ T9472] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 406.238801][ T9472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 406.279828][ T9667] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 406.291785][ T9667] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 406.301881][ T9667] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 406.312494][ T9667] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 406.322592][ T9667] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 406.333202][ T9667] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 406.347367][ T9667] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 406.357410][ T9472] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 406.367958][ T9472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 406.402149][ T9667] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 406.411739][ T9667] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 406.420748][ T9667] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 406.429582][ T9667] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 406.683617][ T30] Bluetooth: hci3: command 0x040f tx timeout [ 406.850652][ T1318] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 406.860802][ T1318] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 406.882685][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 407.049389][ T1318] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 407.057505][ T1318] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 407.080036][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 407.439944][ T9935] EXT4-fs (loop3): Test dummy encryption mode enabled [ 407.447097][ T9935] EXT4-fs (loop3): filesystem is read-only [ 407.454943][ T9935] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 407.465056][ T9935] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 407.477344][ T9935] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 407.487725][ T9935] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 407.499375][ T9935] EXT4-fs error (device loop3): ext4_fill_super:4709: inode #2: comm syz-executor.3: iget: root inode unallocated [ 407.517589][ T9935] EXT4-fs (loop3): get root inode failed [ 407.523622][ T9935] EXT4-fs (loop3): mount failed 12:48:54 executing program 3: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400", 0x63, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f465", 0x33, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:54 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 407.966036][ T9944] EXT4-fs (loop1): Test dummy encryption mode enabled [ 407.979374][ T9945] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 408.040361][ T9944] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 408.050591][ T9944] EXT4-fs (loop1): group descriptors corrupted! 12:48:55 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:48:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b", 0x65, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001", 0x4d, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 408.332530][ T9952] EXT4-fs (loop3): Test dummy encryption mode enabled [ 408.339500][ T9952] EXT4-fs (loop3): filesystem is read-only [ 408.496736][ T9952] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 408.506824][ T9952] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 408.517263][ T9952] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 408.527116][ T9952] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 408.623277][ T9952] EXT4-fs error (device loop3): ext4_fill_super:4709: inode #2: comm syz-executor.3: iget: root inode unallocated [ 408.677350][ T9952] EXT4-fs (loop3): get root inode failed [ 408.683558][ T9952] EXT4-fs (loop3): mount failed [ 408.752479][ T9472] Bluetooth: hci3: command 0x0419 tx timeout [ 408.823790][ T9959] EXT4-fs (loop1): Test dummy encryption mode enabled 12:48:56 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 408.873116][ T9963] EXT4-fs (loop2): invalid first ino: 0 [ 408.885088][ T9959] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 408.895254][ T9959] EXT4-fs (loop1): group descriptors corrupted! 12:48:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001", 0x4d, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:56 executing program 3: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b", 0x65, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 409.343501][ T9971] EXT4-fs (loop2): invalid first ino: 0 [ 409.375142][ T9974] EXT4-fs (loop3): Test dummy encryption mode enabled [ 409.382274][ T9974] EXT4-fs (loop3): filesystem is read-only [ 409.390226][ T9974] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 409.400460][ T9974] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 409.410448][ T9974] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 409.420663][ T9974] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) 12:48:56 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, 0x0, 0x0) [ 409.436172][ T9974] EXT4-fs error (device loop3): ext4_fill_super:4709: inode #2: comm syz-executor.3: iget: root inode unallocated [ 409.449548][ T9974] EXT4-fs (loop3): get root inode failed [ 409.455525][ T9974] EXT4-fs (loop3): mount failed 12:48:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001", 0x4d, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 409.706534][ T9980] EXT4-fs (loop1): Test dummy encryption mode enabled [ 409.769807][ T9980] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 409.780002][ T9980] EXT4-fs (loop1): group descriptors corrupted! [ 409.858478][ T9985] EXT4-fs (loop2): invalid first ino: 0 12:48:57 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, 0x0, 0x0) 12:48:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002", 0x5a, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b", 0x65, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 410.144803][ T9991] EXT4-fs (loop3): Test dummy encryption mode enabled [ 410.152293][ T9991] EXT4-fs (loop3): filesystem is read-only [ 410.199242][ T9991] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 410.209326][ T9991] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 410.219630][ T9991] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 410.229502][ T9991] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) 12:48:57 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, 0x0, 0x0) [ 410.385449][ T9991] EXT4-fs error (device loop3): ext4_fill_super:4709: inode #2: comm syz-executor.3: iget: root inode unallocated [ 410.419520][ T9991] EXT4-fs (loop3): get root inode failed [ 410.425541][ T9991] EXT4-fs (loop3): mount failed [ 410.461563][ T9999] EXT4-fs (loop1): Test dummy encryption mode enabled [ 410.472635][ T9999] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 410.482727][ T9999] EXT4-fs (loop1): group descriptors corrupted! [ 410.566358][T10001] EXT4-fs (loop2): Test dummy encryption mode enabled [ 410.616978][T10001] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 410.627165][T10001] EXT4-fs (loop2): group descriptors corrupted! 12:48:57 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:58 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, 0x0}, 0x0) 12:48:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002", 0x5a, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 411.187900][T10013] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 12:48:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 411.388016][T10017] EXT4-fs (loop2): Test dummy encryption mode enabled 12:48:58 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 411.478858][T10017] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 411.489391][T10017] EXT4-fs (loop2): group descriptors corrupted! 12:48:58 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, 0x0}, 0x0) [ 411.634599][T10021] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 411.685553][ C1] hrtimer: interrupt took 282270 ns 12:48:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002", 0x5a, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:59 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:48:59 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, 0x0}, 0x0) [ 412.218670][T10034] EXT4-fs (loop2): Test dummy encryption mode enabled [ 412.347195][T10034] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 412.357593][T10034] EXT4-fs (loop2): group descriptors corrupted! [ 412.404305][T10038] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 12:48:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, 0x0) 12:48:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000", 0x60, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, 0x0) 12:49:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', 0x0, 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:00 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}], 0x7}, 0x0) [ 413.082552][T10053] EXT4-fs (loop2): Test dummy encryption mode enabled [ 413.092093][T10053] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 413.102045][T10053] EXT4-fs (loop2): group descriptors corrupted! 12:49:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000", 0x60, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:00 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}], 0x7}, 0x0) 12:49:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', 0x0, 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:00 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}], 0x7}, 0x0) 12:49:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, 0x0) [ 413.637188][T10070] EXT4-fs (loop2): Test dummy encryption mode enabled [ 413.677494][T10070] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 413.687494][T10070] EXT4-fs (loop2): group descriptors corrupted! 12:49:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000", 0x60, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', 0x0, 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)) 12:49:01 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {0x0}], 0x8}, 0x0) 12:49:01 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {0x0}], 0x8}, 0x0) [ 414.690824][T10091] EXT4-fs (loop1): filesystem is read-only [ 414.747321][T10091] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 414.757502][T10091] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 414.767789][T10091] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 414.777770][T10091] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 414.817473][T10094] EXT4-fs (loop2): Test dummy encryption mode enabled [ 414.880811][T10094] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 414.891066][T10094] EXT4-fs (loop2): group descriptors corrupted! [ 415.060482][T10091] EXT4-fs error (device loop1): ext4_fill_super:4709: inode #2: comm syz-executor.1: iget: root inode unallocated [ 415.167614][T10091] EXT4-fs (loop1): get root inode failed [ 415.173765][T10091] EXT4-fs (loop1): mount failed 12:49:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:02 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {0x0}], 0x8}, 0x0) 12:49:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400", 0x63, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)) 12:49:02 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) [ 415.653745][T10108] EXT4-fs (loop3): Test dummy encryption mode enabled [ 415.660838][T10108] EXT4-fs (loop3): filesystem is read-only [ 415.773878][T10114] EXT4-fs (loop1): filesystem is read-only [ 415.786167][T10108] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 415.787242][T10114] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 415.806423][T10114] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 415.816511][T10114] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 415.826467][T10114] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 415.837621][T10114] EXT4-fs error (device loop1): ext4_fill_super:4709: inode #2: comm syz-executor.1: iget: root inode unallocated [ 415.851070][T10114] EXT4-fs (loop1): get root inode failed [ 415.857121][T10114] EXT4-fs (loop1): mount failed [ 415.987866][T10117] EXT4-fs (loop2): Test dummy encryption mode enabled 12:49:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)) 12:49:03 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) [ 416.081591][T10117] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 416.092149][T10117] EXT4-fs (loop2): group descriptors corrupted! 12:49:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400", 0x63, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 416.514796][T10125] EXT4-fs (loop1): filesystem is read-only [ 416.539450][T10125] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 416.549720][T10125] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 416.559813][T10125] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 416.569675][T10125] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 416.674995][T10129] EXT4-fs (loop3): Test dummy encryption mode enabled [ 416.682128][T10129] EXT4-fs (loop3): filesystem is read-only 12:49:03 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) [ 416.802574][T10129] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 416.876130][T10125] EXT4-fs error (device loop1): ext4_fill_super:4709: inode #2: comm syz-executor.1: iget: root inode unallocated [ 416.922722][T10125] EXT4-fs (loop1): get root inode failed [ 416.928547][T10125] EXT4-fs (loop1): mount failed [ 417.024241][T10134] EXT4-fs (loop2): Test dummy encryption mode enabled [ 417.056712][T10134] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 417.066881][T10134] EXT4-fs (loop2): group descriptors corrupted! 12:49:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400", 0x63, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:04 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {0x0}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 417.663075][T10142] EXT4-fs (loop3): Test dummy encryption mode enabled [ 417.669967][T10142] EXT4-fs (loop3): filesystem is read-only 12:49:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000", 0x60, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 417.788392][T10142] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 417.964844][T10149] EXT4-fs (loop1): Test dummy encryption mode enabled [ 417.975504][T10148] EXT4-fs (loop2): Test dummy encryption mode enabled [ 418.026863][T10148] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 418.037099][T10148] EXT4-fs (loop2): group descriptors corrupted! [ 418.091773][T10149] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 418.102128][T10149] EXT4-fs (loop1): group descriptors corrupted! 12:49:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:05 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {0x0}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:49:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b", 0x65, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000", 0x60, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:06 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {0x0}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:49:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 418.749649][T10164] EXT4-fs (loop1): Test dummy encryption mode enabled [ 418.773759][T10164] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 418.783889][T10164] EXT4-fs (loop1): group descriptors corrupted! [ 418.842115][T10166] EXT4-fs (loop2): Test dummy encryption mode enabled [ 418.863093][T10166] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 418.873390][T10166] EXT4-fs (loop2): group descriptors corrupted! 12:49:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b", 0x65, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:06 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) 12:49:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000", 0x60, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 419.447329][T10177] EXT4-fs (loop1): Test dummy encryption mode enabled [ 419.461587][T10177] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 419.472510][T10177] EXT4-fs (loop1): group descriptors corrupted! [ 419.569321][T10182] EXT4-fs (loop2): Test dummy encryption mode enabled [ 419.578238][T10182] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 419.588322][T10182] EXT4-fs (loop2): group descriptors corrupted! 12:49:06 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) 12:49:06 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000", 0x60, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b", 0x65, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 420.060686][T10192] EXT4-fs (loop2): Test dummy encryption mode enabled [ 420.099389][T10192] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 420.109550][T10192] EXT4-fs (loop2): group descriptors corrupted! 12:49:07 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000", 0x60, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:07 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) 12:49:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 420.483546][T10202] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 12:49:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:07 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {0x0}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:49:08 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {0x0}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 420.810303][T10212] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 12:49:08 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000", 0x60, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 421.028535][T10216] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 421.144043][T10222] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 12:49:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:08 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {0x0}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:49:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 421.492919][T10231] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 12:49:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', 0x0, 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000", 0x60, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 421.573563][T10234] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 12:49:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, 0x0) 12:49:09 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) 12:49:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', 0x0, 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000", 0x60, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:09 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) [ 422.286302][T10248] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 12:49:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, 0x0) 12:49:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', 0x0, 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000", 0x60, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:09 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) [ 422.832283][T10265] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 12:49:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, 0x0) 12:49:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:10 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {0x0}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:49:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000", 0x60, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)) [ 423.483011][T10283] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 12:49:10 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {0x0}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 423.667312][T10288] EXT4-fs (loop1): Test dummy encryption mode enabled [ 423.725227][T10288] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 423.763202][T10292] EXT4-fs (loop2): filesystem is read-only 12:49:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280), 0x0, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 423.796314][T10292] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 423.806878][T10292] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 423.816937][T10292] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 423.826887][T10292] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 423.844923][T10292] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 423.887012][T10292] EXT4-fs (loop2): get root inode failed [ 423.893367][T10292] EXT4-fs (loop2): mount failed 12:49:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000", 0x60, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)) 12:49:11 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {0x0}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 424.170517][T10301] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 12:49:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280), 0x0, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 424.479820][T10306] EXT4-fs (loop1): Test dummy encryption mode enabled [ 424.502050][T10306] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 424.644630][T10311] EXT4-fs (loop2): filesystem is read-only [ 424.654425][T10311] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 424.664519][T10311] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 424.674673][T10311] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 12:49:11 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) [ 424.686729][T10311] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 424.713053][T10311] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 424.728832][T10311] EXT4-fs (loop2): get root inode failed [ 424.734919][T10311] EXT4-fs (loop2): mount failed 12:49:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000", 0x60, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)) [ 425.024748][T10319] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 425.157474][T10324] EXT4-fs (loop2): filesystem is read-only [ 425.169040][T10325] EXT4-fs (loop1): Test dummy encryption mode enabled [ 425.179772][T10324] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 425.190378][T10324] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 12:49:12 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) [ 425.200512][T10324] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 425.210395][T10324] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 425.230002][T10325] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 425.260710][T10324] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 425.276122][T10324] EXT4-fs (loop2): get root inode failed [ 425.282318][T10324] EXT4-fs (loop2): mount failed 12:49:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280), 0x0, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:12 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) 12:49:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)) [ 425.840372][T10341] EXT4-fs (loop2): filesystem is read-only [ 425.848092][T10341] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 425.859142][T10341] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 425.862567][T10337] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 425.869279][T10341] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 425.888117][T10341] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 425.935552][T10341] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 425.952355][T10341] EXT4-fs (loop2): get root inode failed [ 425.958362][T10341] EXT4-fs (loop2): mount failed 12:49:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:13 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) 12:49:13 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {0x0}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:49:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f465", 0x33, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:13 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) [ 426.803026][T10356] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 12:49:14 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {0x0}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:49:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f465", 0x33, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:14 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) 12:49:14 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {0x0}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 427.534420][T10367] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 427.650236][T10370] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 12:49:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f465", 0x33, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:15 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) 12:49:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:15 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) [ 428.211275][T10384] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 428.218797][T10383] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 12:49:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001", 0x4d, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:15 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) [ 428.735690][T10394] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 428.846048][T10399] EXT4-fs (loop3): invalid first ino: 0 12:49:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:16 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) 12:49:16 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) 12:49:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001", 0x4d, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 429.287026][T10405] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 12:49:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f465", 0x33, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 429.497289][T10413] EXT4-fs (loop3): invalid first ino: 0 12:49:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001", 0x4d, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 430.004156][T10419] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 12:49:17 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {0x0}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:49:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:17 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) [ 430.526724][T10426] EXT4-fs (loop3): invalid first ino: 0 12:49:17 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {0x0}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 430.668102][T10431] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 12:49:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002", 0x5a, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280), 0x0, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:18 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {0x0}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 431.366851][T10439] EXT4-fs (loop3): Test dummy encryption mode enabled [ 431.462682][T10439] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 431.472870][T10439] EXT4-fs (loop3): group descriptors corrupted! [ 431.527872][T10444] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 12:49:18 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) 12:49:19 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) 12:49:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280), 0x0, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 432.124619][T10455] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 432.986854][T10448] IPVS: ftp: loaded support on port[0] = 21 [ 433.963114][T10448] chnl_net:caif_netlink_parms(): no params data found [ 434.475044][T10448] bridge0: port 1(bridge_slave_0) entered blocking state [ 434.482446][T10448] bridge0: port 1(bridge_slave_0) entered disabled state [ 434.492288][T10448] device bridge_slave_0 entered promiscuous mode [ 434.547503][T10448] bridge0: port 2(bridge_slave_1) entered blocking state [ 434.555262][T10448] bridge0: port 2(bridge_slave_1) entered disabled state [ 434.565099][T10448] device bridge_slave_1 entered promiscuous mode [ 434.812337][T10448] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 434.911091][T10448] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 434.922409][ T30] Bluetooth: hci4: command 0x0409 tx timeout [ 435.111733][T10448] team0: Port device team_slave_0 added [ 435.157324][T10448] team0: Port device team_slave_1 added [ 435.325204][T10448] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 435.332487][T10448] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 435.359272][T10448] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 435.487277][T10448] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 435.494747][T10448] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 435.521059][T10448] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 435.736237][T10448] device hsr_slave_0 entered promiscuous mode [ 435.827256][T10448] device hsr_slave_1 entered promiscuous mode [ 435.853724][T10448] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 435.861739][T10448] Cannot create hsr debugfs directory [ 436.577578][T10448] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 436.628617][T10448] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 436.647077][T10448] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 436.744767][T10448] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 436.990315][ T30] Bluetooth: hci4: command 0x041b tx timeout [ 437.505809][T10448] 8021q: adding VLAN 0 to HW filter on device bond0 [ 437.627057][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 437.636276][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 437.672540][T10448] 8021q: adding VLAN 0 to HW filter on device team0 [ 437.744241][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 437.754404][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 437.763910][ T8486] bridge0: port 1(bridge_slave_0) entered blocking state [ 437.771279][ T8486] bridge0: port 1(bridge_slave_0) entered forwarding state [ 437.873558][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 437.882806][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 437.893279][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 437.902766][ T8486] bridge0: port 2(bridge_slave_1) entered blocking state [ 437.910116][ T8486] bridge0: port 2(bridge_slave_1) entered forwarding state [ 437.919237][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 437.930403][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 437.941462][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 437.952026][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 438.011272][T10448] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 438.021920][T10448] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 438.085429][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 438.096025][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 438.106589][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 438.117108][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 438.126865][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 438.137477][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 438.147265][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 438.164336][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 438.201056][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 438.208884][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 438.319127][T10448] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 438.741286][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 438.751606][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 438.922731][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 438.932368][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 438.974958][T10448] device veth0_vlan entered promiscuous mode [ 439.006479][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 439.018342][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 439.069315][T10448] device veth1_vlan entered promiscuous mode [ 439.081764][ T8486] Bluetooth: hci4: command 0x040f tx timeout [ 439.095222][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 439.263572][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 439.273647][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 439.301850][T10448] device veth0_macvtap entered promiscuous mode [ 439.385530][T10448] device veth1_macvtap entered promiscuous mode [ 439.488293][T10448] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 439.499032][T10448] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 439.509253][T10448] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 439.520330][T10448] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 439.530413][T10448] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 439.541046][T10448] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 439.551119][T10448] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 439.561942][T10448] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 439.576185][T10448] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 439.591255][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 439.601318][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 439.611151][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 439.621808][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 439.669224][T10448] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 439.681357][T10448] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 439.691511][T10448] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 439.703285][T10448] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 439.713424][T10448] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 439.724144][T10448] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 439.734276][T10448] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 439.745028][T10448] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 439.759262][T10448] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 439.771738][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 439.782203][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 439.826228][T10448] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 439.838583][T10448] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 439.849013][T10448] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 439.857994][T10448] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 440.379124][ T8490] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 440.387112][ T8490] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 440.420547][ T3125] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 440.522258][ T8490] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 440.530372][ T8490] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 440.540768][ T8499] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 440.974885][T10701] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 441.151769][ T30] Bluetooth: hci4: command 0x0419 tx timeout 12:49:28 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) flistxattr(r0, &(0x7f00000000c0)=""/39, 0x27) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002", 0x5a, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:28 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) 12:49:28 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) 12:49:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280), 0x0, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 441.569510][T10711] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 441.588144][T10712] EXT4-fs (loop3): Test dummy encryption mode enabled [ 441.643776][T10712] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 441.654017][T10712] EXT4-fs (loop3): group descriptors corrupted! 12:49:28 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) 12:49:29 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) [ 441.921279][T10717] EXT4-fs (loop4): Test dummy encryption mode enabled [ 441.928188][T10717] EXT4-fs (loop4): filesystem is read-only 12:49:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655f", 0x30, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 442.048281][T10717] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 442.058391][T10717] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 442.068373][T10717] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 442.078222][T10717] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) 12:49:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002", 0x5a, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 442.248210][T10723] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 442.256965][T10717] EXT4-fs error (device loop4): ext4_fill_super:4709: inode #2: comm syz-executor.4: iget: root inode unallocated 12:49:29 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) [ 442.290038][T10717] EXT4-fs (loop4): get root inode failed [ 442.295768][T10717] EXT4-fs (loop4): mount failed 12:49:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655f", 0x30, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:29 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {0x0}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:49:30 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) [ 442.940773][T10737] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 442.943279][T10734] EXT4-fs (loop3): Test dummy encryption mode enabled [ 443.077497][T10734] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 443.087558][T10734] EXT4-fs (loop3): group descriptors corrupted! 12:49:30 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) [ 443.278553][T10744] EXT4-fs (loop4): Test dummy encryption mode enabled [ 443.285804][T10744] EXT4-fs (loop4): filesystem is read-only 12:49:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655f", 0x30, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 443.336286][T10744] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (1 blocks) 12:49:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000", 0x60, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:30 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {0x0}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 443.813569][T10753] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 12:49:31 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) 12:49:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d783", 0x48, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 444.191110][T10762] EXT4-fs (loop4): Test dummy encryption mode enabled [ 444.193515][T10763] EXT4-fs (loop3): Test dummy encryption mode enabled [ 444.198009][T10762] EXT4-fs (loop4): filesystem is read-only 12:49:31 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {0x0}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 444.360952][T10763] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 444.371143][T10763] EXT4-fs (loop3): group descriptors corrupted! [ 444.410644][T10762] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (1 blocks) 12:49:31 executing program 4 (fault-call:0 fault-nth:0): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000", 0x60, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 444.693309][T10773] EXT4-fs (loop1): Test dummy encryption mode enabled 12:49:31 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) [ 444.738699][T10773] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:49:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d783", 0x48, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 445.191219][T10781] FAULT_INJECTION: forcing a failure. [ 445.191219][T10781] name failslab, interval 1, probability 0, space 0, times 1 [ 445.204164][T10781] CPU: 1 PID: 10781 Comm: syz-executor.4 Not tainted 5.9.0-rc8-syzkaller #0 [ 445.212920][T10781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 445.223043][T10781] Call Trace: [ 445.226543][T10781] dump_stack+0x21c/0x280 [ 445.231087][T10781] should_fail+0x8b7/0x9e0 [ 445.235668][T10781] __should_failslab+0x1fd/0x2a0 [ 445.240766][T10781] should_failslab+0x29/0x70 [ 445.245511][T10781] slab_pre_alloc_hook+0xd5/0x590 [ 445.250649][T10781] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 445.256558][T10781] __kmalloc+0xf5/0x490 [ 445.260860][T10781] ? __se_sys_memfd_create+0x2fd/0xbb0 [ 445.266520][T10781] __se_sys_memfd_create+0x2fd/0xbb0 [ 445.271902][T10781] ? kmsan_get_metadata+0x116/0x180 [ 445.277298][T10781] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 445.283243][T10781] ? syscall_enter_from_user_mode_work+0x51/0x100 12:49:32 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) [ 445.289766][T10781] __ia32_sys_memfd_create+0x3e/0x60 [ 445.295570][T10781] __do_fast_syscall_32+0x129/0x180 [ 445.300889][T10781] do_fast_syscall_32+0x6a/0xc0 [ 445.305856][T10781] do_SYSENTER_32+0x73/0x90 [ 445.310548][T10781] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 445.316977][T10781] RIP: 0023:0xf7fce549 [ 445.321150][T10781] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 445.340852][T10781] RSP: 002b:00000000f55c7eec EFLAGS: 00000292 ORIG_RAX: 0000000000000164 [ 445.349369][T10781] RAX: ffffffffffffffda RBX: 00000000080d8b2b RCX: 0000000000000000 [ 445.357423][T10781] RDX: 0000000000000040 RSI: 00000000080d8fda RDI: 00000000f55c7f54 [ 445.366355][T10781] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 [ 445.374405][T10781] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 445.382481][T10781] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 12:49:32 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) [ 445.476303][T10782] EXT4-fs (loop3): Test dummy encryption mode enabled [ 445.532525][T10782] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 445.542679][T10782] EXT4-fs (loop3): group descriptors corrupted! [ 445.639295][T10786] EXT4-fs (loop1): Test dummy encryption mode enabled [ 445.705543][T10786] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:49:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000", 0x60, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655f", 0x30, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:33 executing program 4 (fault-call:0 fault-nth:1): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:33 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) [ 446.470010][T10797] EXT4-fs (loop3): Test dummy encryption mode enabled [ 446.493637][T10797] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 446.503688][T10797] EXT4-fs (loop3): group descriptors corrupted! 12:49:33 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) [ 446.689771][T10803] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 446.711152][T10805] FAULT_INJECTION: forcing a failure. [ 446.711152][T10805] name failslab, interval 1, probability 0, space 0, times 0 [ 446.724322][T10805] CPU: 1 PID: 10805 Comm: syz-executor.4 Not tainted 5.9.0-rc8-syzkaller #0 [ 446.733220][T10805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 446.743343][T10805] Call Trace: [ 446.746758][T10805] dump_stack+0x21c/0x280 [ 446.751305][T10805] should_fail+0x8b7/0x9e0 [ 446.755857][T10805] __should_failslab+0x1fd/0x2a0 [ 446.760923][T10805] should_failslab+0x29/0x70 [ 446.765628][T10805] slab_pre_alloc_hook+0xd5/0x590 [ 446.770785][T10805] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 446.776703][T10805] kmem_cache_alloc+0xf4/0xc70 [ 446.781633][T10805] ? shmem_alloc_inode+0x54/0xb0 [ 446.786676][T10805] ? kmsan_get_metadata+0x116/0x180 [ 446.792093][T10805] ? kmsan_internal_set_origin+0x85/0xc0 [ 446.797854][T10805] shmem_alloc_inode+0x54/0xb0 [ 446.802743][T10805] ? shmem_match+0x230/0x230 [ 446.807508][T10805] new_inode_pseudo+0xa7/0x580 [ 446.812383][T10805] new_inode+0x5a/0x3d0 [ 446.816665][T10805] ? __msan_poison_alloca+0xe9/0x110 [ 446.822069][T10805] shmem_get_inode+0x1f1/0xe20 [ 446.827047][T10805] __shmem_file_setup+0x2bb/0x640 [ 446.832190][T10805] shmem_file_setup+0xc6/0xe0 [ 446.836978][T10805] __se_sys_memfd_create+0x662/0xbb0 [ 446.842538][T10805] ? kmsan_get_metadata+0x116/0x180 [ 446.847868][T10805] ? syscall_enter_from_user_mode_work+0x51/0x100 [ 446.854401][T10805] __ia32_sys_memfd_create+0x3e/0x60 [ 446.859810][T10805] __do_fast_syscall_32+0x129/0x180 [ 446.865127][T10805] do_fast_syscall_32+0x6a/0xc0 [ 446.870090][T10805] do_SYSENTER_32+0x73/0x90 [ 446.874707][T10805] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 446.881106][T10805] RIP: 0023:0xf7fce549 [ 446.885279][T10805] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 446.905065][T10805] RSP: 002b:00000000f55c7eec EFLAGS: 00000292 ORIG_RAX: 0000000000000164 [ 446.913739][T10805] RAX: ffffffffffffffda RBX: 00000000080d8b2b RCX: 0000000000000000 [ 446.921889][T10805] RDX: 0000000000000040 RSI: 00000000080d8fda RDI: 00000000f55c7f54 [ 446.929976][T10805] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 [ 446.938038][T10805] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 446.946101][T10805] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 12:49:34 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:49:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400", 0x63, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655f", 0x30, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 447.668603][T10816] EXT4-fs (loop3): Test dummy encryption mode enabled [ 447.677656][T10817] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 447.707599][T10816] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 447.718823][T10816] EXT4-fs (loop3): group descriptors corrupted! 12:49:35 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:49:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655f", 0x30, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400", 0x63, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:35 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) 12:49:35 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 448.336877][T10826] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 12:49:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 448.589555][T10831] EXT4-fs (loop3): Test dummy encryption mode enabled [ 448.775477][T10831] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 448.785549][T10831] EXT4-fs (loop3): group descriptors corrupted! 12:49:36 executing program 0 (fault-call:2 fault-nth:0): r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 448.886956][T10837] EXT4-fs (loop4): Test dummy encryption mode enabled [ 448.894334][T10837] EXT4-fs (loop4): filesystem is read-only [ 448.906562][T10837] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 448.918159][T10837] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 448.928338][T10837] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 448.938236][T10837] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 448.960091][T10837] EXT4-fs error (device loop4): ext4_fill_super:4709: inode #2: comm syz-executor.4: iget: root inode unallocated [ 448.978487][T10837] EXT4-fs (loop4): get root inode failed [ 448.984400][T10837] EXT4-fs (loop4): mount failed 12:49:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef0100", 0x3c, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x164, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400", 0x63, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 449.522969][T10847] FAULT_INJECTION: forcing a failure. [ 449.522969][T10847] name failslab, interval 1, probability 0, space 0, times 0 [ 449.536290][T10847] CPU: 0 PID: 10847 Comm: syz-executor.0 Not tainted 5.9.0-rc8-syzkaller #0 [ 449.545045][T10847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 449.555177][T10847] Call Trace: [ 449.558604][T10847] dump_stack+0x21c/0x280 [ 449.563116][T10847] should_fail+0x8b7/0x9e0 [ 449.567657][T10847] __should_failslab+0x1fd/0x2a0 [ 449.572839][T10847] should_failslab+0x29/0x70 [ 449.577545][T10847] slab_pre_alloc_hook+0xd5/0x590 [ 449.582691][T10847] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 449.588620][T10847] kmem_cache_alloc_node+0x10f/0xe00 [ 449.594665][T10847] ? cache_from_obj+0x1c/0x7f0 [ 449.599599][T10847] ? __alloc_skb+0x224/0xae0 [ 449.604290][T10847] ? kmsan_get_metadata+0x116/0x180 [ 449.609616][T10847] ? __msan_instrument_asm_store+0x25/0x130 [ 449.615619][T10847] ? kmem_cache_free+0x99d/0xd10 [ 449.623180][T10847] ? kmsan_get_metadata+0x116/0x180 [ 449.628504][T10847] __alloc_skb+0x224/0xae0 [ 449.633116][T10847] netlink_dump+0x2fd/0x1cb0 [ 449.637825][T10847] ? __kfree_skb+0x284/0x320 [ 449.642554][T10847] netlink_recvmsg+0x10d1/0x1c30 [ 449.647641][T10847] ? netlink_sendmsg+0x1840/0x1840 [ 449.652930][T10847] ____sys_recvmsg+0x591/0xcd0 [ 449.657886][T10847] ? get_compat_msghdr+0x254/0x2b0 [ 449.663120][T10847] ? kmsan_get_metadata+0x116/0x180 [ 449.668480][T10847] __sys_recvmsg+0x579/0xd10 [ 449.673177][T10847] ? kmsan_get_metadata+0x116/0x180 [ 449.678508][T10847] ? kmsan_internal_set_origin+0x85/0xc0 [ 449.684304][T10847] ? fput+0x82/0x320 [ 449.688333][T10847] __se_compat_sys_recvmsg+0xa7/0xc0 [ 449.693827][T10847] __ia32_compat_sys_recvmsg+0x4a/0x70 [ 449.699402][T10847] __do_fast_syscall_32+0x129/0x180 [ 449.704702][T10847] do_fast_syscall_32+0x6a/0xc0 [ 449.709674][T10847] do_SYSENTER_32+0x73/0x90 [ 449.714300][T10847] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 449.720736][T10847] RIP: 0023:0xf7f3c549 [ 449.724914][T10847] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 449.744613][T10847] RSP: 002b:00000000f55360cc EFLAGS: 00000296 ORIG_RAX: 0000000000000174 [ 449.753133][T10847] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020003c00 [ 449.761197][T10847] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 449.769517][T10847] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 449.777584][T10847] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 449.785890][T10847] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 12:49:37 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) [ 450.040707][T10848] EXT4-fs (loop1): Test dummy encryption mode enabled [ 450.101862][T10852] EXT4-fs (loop3): Test dummy encryption mode enabled [ 450.111623][T10852] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 450.121692][T10852] EXT4-fs (loop3): group descriptors corrupted! [ 450.143211][T10848] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 450.368285][T10854] EXT4-fs (loop4): Test dummy encryption mode enabled [ 450.375354][T10854] EXT4-fs (loop4): filesystem is read-only 12:49:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b", 0x65, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:37 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 450.544606][T10854] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (1 blocks) 12:49:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655f", 0x30, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 450.719451][T10854] EXT4-fs (loop4): Test dummy encryption mode enabled [ 450.726857][T10854] EXT4-fs (loop4): filesystem is read-only [ 450.736890][T10854] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (1 blocks) [ 450.850592][T10863] EXT4-fs (loop3): Test dummy encryption mode enabled [ 450.873315][T10863] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 450.883670][T10863] EXT4-fs (loop3): group descriptors corrupted! 12:49:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x165, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:38 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 451.183510][T10870] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 12:49:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b", 0x65, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 451.519090][T10874] EXT4-fs (loop4): Test dummy encryption mode enabled [ 451.526632][T10874] EXT4-fs (loop4): filesystem is read-only [ 451.534887][T10874] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (1 blocks) [ 451.604429][T10874] EXT4-fs (loop4): Test dummy encryption mode enabled [ 451.612420][T10874] EXT4-fs (loop4): filesystem is read-only [ 451.639053][T10874] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (1 blocks) 12:49:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655f", 0x30, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:39 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) 12:49:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x166, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:39 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x2, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 452.047792][T10885] EXT4-fs (loop3): Test dummy encryption mode enabled [ 452.076440][T10885] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 452.086424][T10885] EXT4-fs (loop3): group descriptors corrupted! [ 452.202388][T10891] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 12:49:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b", 0x65, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 452.413207][T10895] EXT4-fs (loop4): Test dummy encryption mode enabled [ 452.420305][T10895] EXT4-fs (loop4): filesystem is read-only 12:49:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655f", 0x30, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:39 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x4, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 452.574349][T10895] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (1 blocks) [ 452.726995][T10895] EXT4-fs (loop4): Test dummy encryption mode enabled [ 452.735085][T10895] EXT4-fs (loop4): filesystem is read-only [ 452.768014][T10895] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (1 blocks) 12:49:40 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x6, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:49:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x188, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:40 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) [ 453.104763][T10908] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 453.256470][T10910] EXT4-fs (loop3): Test dummy encryption mode enabled [ 453.336654][T10910] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 453.348801][T10910] EXT4-fs (loop3): group descriptors corrupted! 12:49:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100", 0x36, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:40 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x8, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 453.803329][T10925] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 453.813693][T10924] EXT4-fs (loop4): Test dummy encryption mode enabled [ 453.820895][T10924] EXT4-fs (loop4): filesystem is read-only [ 453.831055][T10924] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (1 blocks) [ 453.975668][T10924] EXT4-fs (loop4): Test dummy encryption mode enabled [ 453.982771][T10924] EXT4-fs (loop4): filesystem is read-only [ 454.129531][T10924] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (1 blocks) [ 454.179158][T10936] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 12:49:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100", 0x36, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:41 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0xf, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:49:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8d60, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:41 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) [ 454.899579][T10941] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 455.057320][T10946] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 12:49:42 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x60, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:49:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100", 0x36, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 455.482107][T10957] EXT4-fs (loop4): Test dummy encryption mode enabled [ 455.489015][T10957] EXT4-fs (loop4): filesystem is read-only 12:49:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 455.623507][T10957] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (17 blocks) [ 455.732721][T10957] EXT4-fs (loop4): Test dummy encryption mode enabled [ 455.739624][T10957] EXT4-fs (loop4): filesystem is read-only [ 455.770631][T10957] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (17 blocks) [ 455.862055][T10963] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 12:49:43 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) [ 456.084621][T10971] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 12:49:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8d61, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, 0x0) 12:49:43 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x600, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:49:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 456.655869][T10978] EXT4-fs (loop4): Test dummy encryption mode enabled [ 456.663036][T10978] EXT4-fs (loop4): filesystem is read-only [ 456.675987][T10978] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (17 blocks) [ 456.765801][T10978] EXT4-fs (loop4): Test dummy encryption mode enabled [ 456.772834][T10978] EXT4-fs (loop4): filesystem is read-only [ 456.780821][T10978] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (17 blocks) [ 456.951669][T10990] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 12:49:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8d62, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, 0x0) 12:49:44 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0xec0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:49:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 457.420831][T10997] EXT4-fs (loop4): Test dummy encryption mode enabled [ 457.427732][T10997] EXT4-fs (loop4): filesystem is read-only 12:49:44 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) [ 457.566984][T10997] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (17 blocks) 12:49:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, 0x0) [ 457.613305][T11005] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 12:49:44 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0xf00, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 457.820310][T10997] EXT4-fs (loop4): Test dummy encryption mode enabled [ 457.827216][T10997] EXT4-fs (loop4): filesystem is read-only [ 457.838869][T10997] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (17 blocks) 12:49:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8d63, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)) 12:49:45 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x12d8, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 458.565262][T11022] EXT4-fs (loop3): filesystem is read-only [ 458.612092][T11022] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 458.622153][T11022] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 458.632159][T11022] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 458.642021][T11022] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 458.653292][T11022] EXT4-fs error (device loop3): ext4_fill_super:4709: inode #2: comm syz-executor.3: iget: root inode unallocated [ 458.666576][T11022] EXT4-fs (loop3): get root inode failed [ 458.673619][T11022] EXT4-fs (loop3): mount failed [ 458.742357][T11027] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 458.758879][T11029] EXT4-fs (loop4): Test dummy encryption mode enabled [ 458.766294][T11029] EXT4-fs (loop4): filesystem is read-only [ 458.922292][T11029] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (17 blocks) 12:49:46 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) [ 459.033554][T11029] EXT4-fs (loop4): Test dummy encryption mode enabled [ 459.040548][T11029] EXT4-fs (loop4): filesystem is read-only [ 459.109501][T11029] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (17 blocks) 12:49:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef01", 0x3b, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:46 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x3f00, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:49:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8d64, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 459.752266][T11044] EXT4-fs (loop1): Test dummy encryption mode enabled [ 459.767668][T11044] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:49:47 executing program 3 (fault-call:0 fault-nth:0): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)) 12:49:47 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x6000, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 460.102049][T11054] FAULT_INJECTION: forcing a failure. [ 460.102049][T11054] name failslab, interval 1, probability 0, space 0, times 0 [ 460.115968][T11054] CPU: 1 PID: 11054 Comm: syz-executor.3 Not tainted 5.9.0-rc8-syzkaller #0 [ 460.124730][T11054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 460.134854][T11054] Call Trace: [ 460.138269][T11054] dump_stack+0x21c/0x280 [ 460.142727][T11054] should_fail+0x8b7/0x9e0 [ 460.147438][T11054] __should_failslab+0x1fd/0x2a0 [ 460.152500][T11054] should_failslab+0x29/0x70 [ 460.157200][T11054] slab_pre_alloc_hook+0xd5/0x590 [ 460.162333][T11054] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 460.168337][T11054] __kmalloc+0xf5/0x490 [ 460.172590][T11054] ? __se_sys_memfd_create+0x2fd/0xbb0 [ 460.178160][T11054] __se_sys_memfd_create+0x2fd/0xbb0 [ 460.183543][T11054] ? kmsan_get_metadata+0x116/0x180 [ 460.188848][T11054] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 460.194781][T11054] ? syscall_enter_from_user_mode_work+0x51/0x100 [ 460.201290][T11054] __ia32_sys_memfd_create+0x3e/0x60 [ 460.206794][T11054] __do_fast_syscall_32+0x129/0x180 [ 460.212103][T11054] do_fast_syscall_32+0x6a/0xc0 [ 460.217112][T11054] do_SYSENTER_32+0x73/0x90 [ 460.221742][T11054] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 460.228147][T11054] RIP: 0023:0xf7fa1549 [ 460.232318][T11054] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 12:49:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef01", 0x3b, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 460.252365][T11054] RSP: 002b:00000000f559aeec EFLAGS: 00000292 ORIG_RAX: 0000000000000164 [ 460.261066][T11054] RAX: ffffffffffffffda RBX: 00000000080d8b2b RCX: 0000000000000000 [ 460.270982][T11054] RDX: 0000000000000040 RSI: 00000000080d8fda RDI: 00000000f559af54 [ 460.279038][T11054] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 [ 460.287091][T11054] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 460.295172][T11054] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 460.420301][T11053] EXT4-fs (loop4): Test dummy encryption mode enabled [ 460.427211][T11053] EXT4-fs (loop4): filesystem is read-only [ 460.522890][T11053] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (17 blocks) [ 460.663615][T11053] EXT4-fs (loop4): Test dummy encryption mode enabled [ 460.670635][T11053] EXT4-fs (loop4): filesystem is read-only [ 460.726824][T11053] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (17 blocks) 12:49:48 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) [ 461.011897][T11063] EXT4-fs (loop1): Test dummy encryption mode enabled 12:49:48 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0xc00e, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 461.053998][T11063] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:49:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8d65, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef01", 0x3b, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 461.741763][T11075] EXT4-fs (loop1): Test dummy encryption mode enabled [ 461.754768][T11075] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:49:49 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0xd812, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:49:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)) [ 461.865680][T11077] EXT4-fs (loop4): Test dummy encryption mode enabled [ 461.872881][T11077] EXT4-fs (loop4): filesystem is read-only [ 461.940110][T11077] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (17 blocks) 12:49:49 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x1a000, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:49:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 462.146658][T11077] EXT4-fs (loop4): Test dummy encryption mode enabled [ 462.155963][T11077] EXT4-fs (loop4): filesystem is read-only [ 462.239899][T11077] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (17 blocks) 12:49:49 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) [ 462.379352][T11086] EXT4-fs (loop3): filesystem is read-only 12:49:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8d66, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 462.442948][T11086] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 462.453323][T11086] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 462.463370][T11086] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 462.473269][T11086] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) 12:49:50 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x34000, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 462.932569][T11092] EXT4-fs (loop1): Test dummy encryption mode enabled [ 462.983624][T11086] EXT4-fs error (device loop3): ext4_fill_super:4709: inode #2: comm syz-executor.3: iget: root inode unallocated [ 463.034599][T11092] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 463.111766][T11086] EXT4-fs (loop3): get root inode failed [ 463.119472][T11086] EXT4-fs (loop3): mount failed [ 463.332865][T11100] EXT4-fs (loop4): Test dummy encryption mode enabled [ 463.339930][T11100] EXT4-fs (loop4): filesystem is read-only [ 463.425712][T11100] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (17 blocks) 12:49:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8d60, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)) 12:49:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 463.614740][T11100] EXT4-fs (loop4): Test dummy encryption mode enabled [ 463.621747][T11100] EXT4-fs (loop4): filesystem is read-only [ 463.694137][T11100] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (17 blocks) 12:49:51 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x400300, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:49:51 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) 12:49:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8d67, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 464.045680][T11111] EXT4-fs (loop1): Test dummy encryption mode enabled [ 464.077747][T11111] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 464.162265][T11114] EXT4-fs (loop3): filesystem is read-only [ 464.197037][T11114] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (17 blocks) [ 464.394004][T11114] EXT4-fs (loop3): filesystem is read-only [ 464.415524][T11114] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (17 blocks) 12:49:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 464.706396][T11127] EXT4-fs (loop4): Test dummy encryption mode enabled [ 464.715688][T11127] EXT4-fs (loop4): filesystem is read-only [ 464.768039][T11127] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (17 blocks) 12:49:52 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0xa00100, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:49:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8d61, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)) [ 464.980861][T11127] EXT4-fs (loop4): Test dummy encryption mode enabled [ 464.987779][T11127] EXT4-fs (loop4): filesystem is read-only [ 465.004819][T11130] EXT4-fs (loop1): Test dummy encryption mode enabled [ 465.074463][T11130] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 465.172916][T11127] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (17 blocks) 12:49:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9161, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef01", 0x3b}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:52 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) 12:49:52 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x1000000, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 465.717502][T11143] EXT4-fs (loop3): filesystem is read-only [ 465.764303][T11143] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (17 blocks) [ 465.902850][T11143] EXT4-fs (loop3): filesystem is read-only [ 465.953579][T11150] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 465.956029][T11143] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (17 blocks) [ 466.131092][T11155] EXT4-fs (loop4): Test dummy encryption mode enabled [ 466.138903][T11155] EXT4-fs (loop4): filesystem is read-only 12:49:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8d62, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)) [ 466.232967][T11155] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (18 blocks) 12:49:53 executing program 5 (fault-call:0 fault-nth:0): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 466.408369][T11155] EXT4-fs (loop4): Test dummy encryption mode enabled [ 466.415521][T11155] EXT4-fs (loop4): filesystem is read-only 12:49:53 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x2000000, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:49:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef01", 0x3b}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 466.800505][T11155] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (18 blocks) [ 466.925225][T11166] EXT4-fs (loop3): filesystem is read-only [ 467.003195][T11166] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (17 blocks) [ 467.129204][T11166] EXT4-fs (loop3): filesystem is read-only [ 467.164816][T11166] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (17 blocks) 12:49:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9162, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8d63, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)) 12:49:54 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) [ 467.355258][T11173] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 12:49:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef01", 0x3b}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:49:54 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x4000000, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 467.826461][T11186] EXT4-fs (loop4): Test dummy encryption mode enabled [ 467.833635][T11186] EXT4-fs (loop4): filesystem is read-only [ 467.906606][T11188] EXT4-fs (loop3): filesystem is read-only [ 467.963067][T11188] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (17 blocks) [ 467.997835][T11186] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (18 blocks) [ 468.066733][T11192] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 12:49:55 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x6000000, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 468.185986][T11188] EXT4-fs (loop3): filesystem is read-only [ 468.193862][T11188] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (17 blocks) [ 468.232986][T11186] EXT4-fs (loop4): Test dummy encryption mode enabled [ 468.240048][T11186] EXT4-fs (loop4): filesystem is read-only [ 468.300005][T11186] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (18 blocks) 12:49:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef01", 0x3b, 0x400}], 0x0, 0x0) 12:49:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8d64, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)) 12:49:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9163, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 468.902020][T11214] EXT4-fs (loop3): filesystem is read-only [ 468.917140][T11214] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (17 blocks) [ 468.944807][T11217] EXT4-fs (loop4): Test dummy encryption mode enabled [ 468.951823][T11217] EXT4-fs (loop4): filesystem is read-only [ 469.024822][T11217] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (18 blocks) [ 469.064428][T11214] EXT4-fs (loop3): filesystem is read-only [ 469.103683][T11214] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (17 blocks) [ 469.327992][T11217] EXT4-fs (loop4): Test dummy encryption mode enabled [ 469.335192][T11217] EXT4-fs (loop4): filesystem is read-only [ 469.513413][T11217] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (18 blocks) [ 469.619188][T11197] IPVS: ftp: loaded support on port[0] = 21 [ 470.201757][T11197] chnl_net:caif_netlink_parms(): no params data found [ 470.463913][T11197] bridge0: port 1(bridge_slave_0) entered blocking state [ 470.471472][T11197] bridge0: port 1(bridge_slave_0) entered disabled state [ 470.481418][T11197] device bridge_slave_0 entered promiscuous mode [ 470.498333][T11197] bridge0: port 2(bridge_slave_1) entered blocking state [ 470.505950][T11197] bridge0: port 2(bridge_slave_1) entered disabled state [ 470.515947][T11197] device bridge_slave_1 entered promiscuous mode [ 470.615430][T11197] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 470.637548][T11197] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 470.708289][T11197] team0: Port device team_slave_0 added [ 470.726250][T11197] team0: Port device team_slave_1 added [ 470.830735][ T30] Bluetooth: hci0: command 0x0406 tx timeout [ 470.922407][T11197] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 470.929492][T11197] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 470.956211][T11197] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 471.011212][T11197] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 471.018290][T11197] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 471.044506][T11197] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 471.224174][T11197] device hsr_slave_0 entered promiscuous mode [ 471.255316][T11197] device hsr_slave_1 entered promiscuous mode [ 471.263988][T11197] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 471.274253][T11197] Cannot create hsr debugfs directory [ 471.389957][ T30] Bluetooth: hci5: command 0x0409 tx timeout [ 472.027446][T11197] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 472.121316][T11197] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 472.172814][T11197] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 472.261465][T11197] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 473.107977][T11197] 8021q: adding VLAN 0 to HW filter on device bond0 [ 473.175039][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 473.184416][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 473.213882][T11197] 8021q: adding VLAN 0 to HW filter on device team0 [ 473.274306][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 473.284224][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 473.293607][ T8486] bridge0: port 1(bridge_slave_0) entered blocking state [ 473.300924][ T8486] bridge0: port 1(bridge_slave_0) entered forwarding state [ 473.428912][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 473.438359][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 473.448524][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 473.458403][ T8486] bridge0: port 2(bridge_slave_1) entered blocking state [ 473.465714][ T8486] bridge0: port 2(bridge_slave_1) entered forwarding state [ 473.474946][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 473.485991][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 473.497160][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 473.507838][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 473.575110][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 473.585129][ T8486] Bluetooth: hci5: command 0x041b tx timeout [ 473.628218][ T8885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 473.638985][ T8885] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 473.705836][ T8885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 473.715929][ T8885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 473.725648][ T8885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 473.735390][ T8885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 473.782055][T11197] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 473.909398][ T8885] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 473.919113][ T8885] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 473.974078][T11197] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 474.501338][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 474.511255][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 474.645179][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 474.657150][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 474.712160][T11197] device veth0_vlan entered promiscuous mode [ 474.728394][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 474.737649][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 474.843553][T11197] device veth1_vlan entered promiscuous mode [ 475.058726][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 475.068386][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 475.078180][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 475.088329][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 475.143739][T11197] device veth0_macvtap entered promiscuous mode [ 475.179102][T11197] device veth1_macvtap entered promiscuous mode [ 475.200136][ T746] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 475.210259][ T746] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 475.283343][T11197] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 475.294013][T11197] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 475.304484][T11197] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 475.315089][T11197] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 475.325112][T11197] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 475.335709][T11197] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 475.345734][T11197] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 475.356322][T11197] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 475.366363][T11197] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 475.376952][T11197] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 475.391393][T11197] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 475.405627][ T746] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 475.415874][ T746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 475.526811][T11197] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 475.538763][T11197] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 475.548997][T11197] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 475.559672][T11197] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 475.569687][T11197] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 475.580249][T11197] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 475.590609][T11197] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 475.601195][T11197] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 475.611230][T11197] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 475.621831][T11197] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 475.636160][T11197] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 475.659130][ T746] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 475.669624][ T746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 475.696299][ T746] Bluetooth: hci5: command 0x040f tx timeout [ 475.730525][T11197] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 475.739402][T11197] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 475.749577][T11197] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 475.758519][T11197] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 476.151520][ T9362] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 476.160727][ T9362] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 476.240994][ T746] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 476.388111][ T1318] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 476.396312][ T1318] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 476.410736][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 476.706545][T11470] FAULT_INJECTION: forcing a failure. [ 476.706545][T11470] name failslab, interval 1, probability 0, space 0, times 0 [ 476.719567][T11470] CPU: 1 PID: 11470 Comm: syz-executor.5 Not tainted 5.9.0-rc8-syzkaller #0 [ 476.728321][T11470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.738445][T11470] Call Trace: [ 476.741859][T11470] dump_stack+0x21c/0x280 [ 476.746318][T11470] should_fail+0x8b7/0x9e0 [ 476.750858][T11470] __should_failslab+0x1fd/0x2a0 [ 476.755926][T11470] should_failslab+0x29/0x70 [ 476.760638][T11470] slab_pre_alloc_hook+0xd5/0x590 [ 476.765780][T11470] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 476.771696][T11470] __kmalloc+0xf5/0x490 [ 476.775957][T11470] ? __se_sys_memfd_create+0x2fd/0xbb0 [ 476.781528][T11470] __se_sys_memfd_create+0x2fd/0xbb0 [ 476.787385][T11470] ? kmsan_get_metadata+0x116/0x180 [ 476.792967][T11470] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 476.798969][T11470] ? syscall_enter_from_user_mode_work+0x51/0x100 [ 476.805508][T11470] __ia32_sys_memfd_create+0x3e/0x60 [ 476.810931][T11470] __do_fast_syscall_32+0x129/0x180 [ 476.816255][T11470] do_fast_syscall_32+0x6a/0xc0 [ 476.821216][T11470] do_SYSENTER_32+0x73/0x90 [ 476.825929][T11470] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 476.832335][T11470] RIP: 0023:0xf7ff0549 [ 476.836508][T11470] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 476.856547][T11470] RSP: 002b:00000000f55e9eec EFLAGS: 00000292 ORIG_RAX: 0000000000000164 [ 476.865078][T11470] RAX: ffffffffffffffda RBX: 00000000080d8b2b RCX: 0000000000000000 [ 476.873142][T11470] RDX: 0000000000000040 RSI: 00000000080d8fda RDI: 00000000f55e9f54 [ 476.881201][T11470] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 [ 476.889256][T11470] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 476.897410][T11470] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 12:50:04 executing program 5 (fault-call:0 fault-nth:1): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:50:04 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x8000000, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:50:04 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) 12:50:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef01", 0x3b, 0x400}], 0x0, 0x0) 12:50:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8d65, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)) 12:50:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9164, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 477.367374][T11480] EXT4-fs (loop3): filesystem is read-only 12:50:04 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0xf000000, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 477.422384][T11480] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (17 blocks) [ 477.453296][T11482] EXT4-fs (loop4): Test dummy encryption mode enabled [ 477.460393][T11482] EXT4-fs (loop4): filesystem is read-only [ 477.509687][T11487] FAULT_INJECTION: forcing a failure. [ 477.509687][T11487] name failslab, interval 1, probability 0, space 0, times 0 [ 477.525434][T11487] CPU: 0 PID: 11487 Comm: syz-executor.5 Not tainted 5.9.0-rc8-syzkaller #0 [ 477.534206][T11487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 477.544952][T11487] Call Trace: [ 477.548371][T11487] dump_stack+0x21c/0x280 [ 477.552823][T11487] should_fail+0x8b7/0x9e0 [ 477.557357][T11487] __should_failslab+0x1fd/0x2a0 [ 477.562405][T11487] should_failslab+0x29/0x70 [ 477.567092][T11487] slab_pre_alloc_hook+0xd5/0x590 [ 477.572201][T11487] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 477.578080][T11487] kmem_cache_alloc+0xf4/0xc70 [ 477.582914][T11487] ? shmem_alloc_inode+0x54/0xb0 [ 477.587914][T11487] ? kmsan_get_metadata+0x116/0x180 [ 477.593185][T11487] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 477.599711][T11487] shmem_alloc_inode+0x54/0xb0 [ 477.604540][T11487] ? shmem_match+0x230/0x230 [ 477.609201][T11487] new_inode_pseudo+0xa7/0x580 [ 477.614035][T11487] new_inode+0x5a/0x3d0 [ 477.618278][T11487] ? __msan_poison_alloca+0xe9/0x110 [ 477.623643][T11487] shmem_get_inode+0x1f1/0xe20 [ 477.628494][T11487] __shmem_file_setup+0x2bb/0x640 [ 477.633607][T11487] shmem_file_setup+0xc6/0xe0 [ 477.638979][T11487] __se_sys_memfd_create+0x662/0xbb0 [ 477.644448][T11487] ? kmsan_get_metadata+0x116/0x180 [ 477.649750][T11487] ? syscall_enter_from_user_mode_work+0x51/0x100 [ 477.656235][T11487] __ia32_sys_memfd_create+0x3e/0x60 [ 477.661615][T11487] __do_fast_syscall_32+0x129/0x180 [ 477.666903][T11487] do_fast_syscall_32+0x6a/0xc0 [ 477.671831][T11487] do_SYSENTER_32+0x73/0x90 [ 477.676412][T11487] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 477.682782][T11487] RIP: 0023:0xf7ff0549 [ 477.686925][T11487] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 477.706587][T11487] RSP: 002b:00000000f55e9eec EFLAGS: 00000292 ORIG_RAX: 0000000000000164 [ 477.715073][T11487] RAX: ffffffffffffffda RBX: 00000000080d8b2b RCX: 0000000000000000 [ 477.723114][T11487] RDX: 0000000000000040 RSI: 00000000080d8fda RDI: 00000000f55e9f54 [ 477.731136][T11487] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 [ 477.739159][T11487] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 477.747179][T11487] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 477.769799][T11482] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (18 blocks) [ 477.779345][ T746] Bluetooth: hci5: command 0x0419 tx timeout [ 477.911522][T11482] EXT4-fs (loop4): Test dummy encryption mode enabled [ 477.918447][T11482] EXT4-fs (loop4): filesystem is read-only [ 477.932869][T11480] EXT4-fs (loop3): filesystem is read-only [ 477.943109][T11480] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (17 blocks) [ 477.984866][T11482] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (18 blocks) 12:50:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef01", 0x3b, 0x400}], 0x0, 0x0) 12:50:05 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) 12:50:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8d66, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)) 12:50:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9165, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:50:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 478.937969][T11507] EXT4-fs (loop4): Test dummy encryption mode enabled [ 478.945186][T11507] EXT4-fs (loop4): filesystem is read-only [ 478.986709][T11508] EXT4-fs (loop3): filesystem is read-only [ 478.995247][T11507] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (18 blocks) 12:50:06 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x3f000000, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 479.121142][T11511] EXT4-fs (loop5): Test dummy encryption mode enabled [ 479.128056][T11511] EXT4-fs (loop5): filesystem is read-only [ 479.147032][T11508] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (17 blocks) [ 479.174124][T11511] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 479.184303][T11511] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 479.194656][T11511] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 479.204578][T11511] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 479.275256][T11507] EXT4-fs (loop4): Test dummy encryption mode enabled [ 479.282469][T11507] EXT4-fs (loop4): filesystem is read-only [ 479.296233][T11507] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (18 blocks) [ 479.320321][T11511] EXT4-fs error (device loop5): ext4_fill_super:4709: inode #2: comm syz-executor.5: iget: root inode unallocated 12:50:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef01", 0x3b, 0x400}], 0x0, &(0x7f0000000000)) [ 479.372287][T11511] EXT4-fs (loop5): get root inode failed [ 479.378385][T11511] EXT4-fs (loop5): mount failed [ 479.416143][T11508] EXT4-fs (loop3): filesystem is read-only [ 479.485458][T11508] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (17 blocks) 12:50:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9166, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:50:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:50:07 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc", 0x13}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) 12:50:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8d67, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)) [ 479.961622][T11527] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:50:07 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x60000000, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:50:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef01", 0x3b, 0x400}], 0x0, &(0x7f0000000000)) [ 480.464359][T11543] EXT4-fs (loop3): filesystem is read-only [ 480.468361][T11540] EXT4-fs (loop5): Test dummy encryption mode enabled [ 480.477514][T11540] EXT4-fs (loop5): filesystem is read-only [ 480.479374][T11543] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (17 blocks) [ 480.511739][T11539] EXT4-fs (loop4): Test dummy encryption mode enabled [ 480.518600][T11539] EXT4-fs (loop4): filesystem is read-only [ 480.530475][T11540] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 480.614664][T11543] EXT4-fs (loop3): filesystem is read-only [ 480.626619][T11539] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (18 blocks) [ 480.663839][T11543] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (17 blocks) [ 480.697273][T11540] EXT4-fs (loop5): Test dummy encryption mode enabled [ 480.704310][T11540] EXT4-fs (loop5): filesystem is read-only 12:50:07 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0xc00e0000, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 480.728926][T11540] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 480.802532][T11550] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 480.851609][T11539] EXT4-fs (loop4): Test dummy encryption mode enabled [ 480.859559][T11539] EXT4-fs (loop4): filesystem is read-only [ 480.924533][T11539] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (18 blocks) [ 481.069652][ T746] Bluetooth: hci1: command 0x0406 tx timeout 12:50:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef01", 0x3b, 0x400}], 0x0, &(0x7f0000000000)) 12:50:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xba, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:50:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9161, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)) 12:50:08 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc", 0x13}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) 12:50:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9167, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:50:09 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0xd8120000, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 481.828541][T11570] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 481.991095][T11575] EXT4-fs (loop3): filesystem is read-only [ 482.001037][T11573] EXT4-fs (loop5): Test dummy encryption mode enabled [ 482.008075][T11573] EXT4-fs (loop5): filesystem is read-only [ 482.053766][T11575] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (18 blocks) [ 482.176952][T11579] EXT4-fs (loop4): Test dummy encryption mode enabled [ 482.184061][T11579] EXT4-fs (loop4): filesystem is read-only [ 482.194342][T11579] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (18 blocks) [ 482.260557][T11573] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 482.276615][T11579] EXT4-fs (loop4): Test dummy encryption mode enabled [ 482.283954][T11579] EXT4-fs (loop4): filesystem is read-only 12:50:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9162, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)) [ 482.460086][T11579] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (18 blocks) 12:50:09 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)={0x2, 0xa, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in=@remote, @in6=@rand_addr=' \x01\x00', 0x0, 0x0, 0x14}]}, 0x38}}, 0x0) [ 482.611773][T11573] EXT4-fs (loop5): Test dummy encryption mode enabled [ 482.618667][T11573] EXT4-fs (loop5): filesystem is read-only 12:50:09 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc", 0x13}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) 12:50:09 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xaf8}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 482.749556][T11573] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) 12:50:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:50:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x28e, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 483.050286][T11593] EXT4-fs (loop3): filesystem is read-only 12:50:10 executing program 1: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_nanosleep(0x2, 0x0, &(0x7f00000000c0)={0x0, r0+10000000}, 0x0) [ 483.105612][T11593] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (18 blocks) [ 483.270336][T11593] EXT4-fs (loop3): filesystem is read-only [ 483.282506][T11593] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (18 blocks) 12:50:10 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0x200026fe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 483.579783][T11607] EXT4-fs (loop4): Test dummy encryption mode enabled [ 483.586741][T11607] EXT4-fs (loop4): filesystem is read-only [ 483.598761][T11607] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (64 blocks) 12:50:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9163, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)) 12:50:10 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x101}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r2 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) sendmmsg(r2, &(0x7f0000000480), 0x2e9, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x100, 0x0, 0x0, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8004}, 0x0) [ 483.676645][T11607] EXT4-fs (loop4): Test dummy encryption mode enabled [ 483.683728][T11607] EXT4-fs (loop4): filesystem is read-only [ 483.696083][T11607] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (64 blocks) [ 483.841655][T11613] EXT4-fs (loop5): Test dummy encryption mode enabled [ 483.848668][T11613] EXT4-fs (loop5): filesystem is read-only 12:50:11 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0x7ffff000}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 483.970047][T11613] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) 12:50:11 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d", 0x1c}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) 12:50:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x30000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 484.211523][T11613] EXT4-fs (loop5): Test dummy encryption mode enabled [ 484.218425][T11613] EXT4-fs (loop5): filesystem is read-only [ 484.302177][T11627] EXT4-fs (loop3): filesystem is read-only [ 484.315460][T11627] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (18 blocks) [ 484.339084][T11613] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 484.413084][T11627] EXT4-fs (loop3): filesystem is read-only [ 484.428435][T11627] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (18 blocks) 12:50:11 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0x9fa}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:50:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x35a, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:50:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9164, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)) [ 484.830313][T11637] EXT4-fs (loop4): Test dummy encryption mode enabled [ 484.837295][T11637] EXT4-fs (loop4): filesystem is read-only [ 484.908257][T11637] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (96 blocks) [ 485.057793][T11637] EXT4-fs (loop4): Test dummy encryption mode enabled [ 485.065294][T11637] EXT4-fs (loop4): filesystem is read-only [ 485.117626][T11637] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (96 blocks) 12:50:12 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0x20000322}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:50:12 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)={0x2, 0xa, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in=@remote, @in6=@rand_addr=' \x01\x00', 0x2, 0x0, 0x14}]}, 0x38}}, 0x0) [ 485.275437][T11648] EXT4-fs (loop5): Test dummy encryption mode enabled [ 485.282845][T11648] EXT4-fs (loop5): filesystem is read-only [ 485.343791][T11650] EXT4-fs (loop3): filesystem is read-only [ 485.396408][T11650] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (18 blocks) [ 485.426971][T11648] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 485.527567][T11650] EXT4-fs (loop3): filesystem is read-only [ 485.546044][T11648] EXT4-fs (loop5): Test dummy encryption mode enabled [ 485.553165][T11648] EXT4-fs (loop5): filesystem is read-only 12:50:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3b030, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 485.568740][T11650] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (18 blocks) [ 485.597106][T11648] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) 12:50:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9165, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)) 12:50:13 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d", 0x1c}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) 12:50:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3994, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:50:13 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010500)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x1400}, {&(0x7f0000000280)="1797f96f0000000000100000000000000200000000000000ee0c0ecb65c003bdc4d40d00000010007669df3580efdc5a5f5f34ee74a141000012000000000000000100000002000000ffffffffffffffffffffffffffffffffffffffff010000000000f9ff00000000000000000300ffffffffffffffffffffffffffffffffffff0100000000b400000000000000000000850100000600000001000000010000000100000004", 0xa6, 0x200000}], 0x0, &(0x7f0000012400)) 12:50:13 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0x7fffef02}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 486.330252][T11669] EXT4-fs (loop3): filesystem is read-only [ 486.340499][T11669] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (18 blocks) [ 486.358184][T11670] EXT4-fs (loop4): Test dummy encryption mode enabled [ 486.365342][T11670] EXT4-fs (loop4): filesystem is read-only [ 486.402888][T11677] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 486.411155][T11677] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 486.458414][T11670] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (118 blocks) [ 486.507917][T11669] EXT4-fs (loop3): filesystem is read-only [ 486.538244][T11677] F2FS-fs (loop1): invalid crc value [ 486.544015][T11677] attempt to access beyond end of device [ 486.550141][T11677] loop1: rw=12288, want=8200, limit=8192 [ 486.555914][T11677] F2FS-fs (loop1): Failed to get valid F2FS checkpoint 12:50:13 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x918}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 486.614767][T11669] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (18 blocks) [ 486.641864][T11681] EXT4-fs (loop5): Test dummy encryption mode enabled [ 486.648761][T11681] EXT4-fs (loop5): filesystem is read-only [ 486.656311][T11681] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (7 blocks) 12:50:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9166, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)) [ 486.887401][T11670] EXT4-fs (loop4): Test dummy encryption mode enabled [ 486.894423][T11670] EXT4-fs (loop4): filesystem is read-only [ 486.939133][T11681] EXT4-fs (loop5): Test dummy encryption mode enabled [ 486.946199][T11681] EXT4-fs (loop5): filesystem is read-only [ 487.114198][T11670] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (118 blocks) 12:50:14 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d", 0x1c}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) [ 487.160276][T11681] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (7 blocks) 12:50:14 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010500)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x1400}, {&(0x7f0000000280)="1797f96f0000000000100000000000000200000000000000ee0c0ecb65c003bdc4d40d00000010007669df3580efdc5a5f5f34ee74a141000012000000000000000100000002000000ffffffffffffffffffffffffffffffffffffffff010000000000f9ff00000000000000000300ffffffffffffffffffffffffffffffffffff0100000000b400000000000000000000850100000600000001000000010000000100000004", 0xa6, 0x200000}], 0x0, &(0x7f0000012400)) [ 487.406322][T11693] EXT4-fs (loop3): filesystem is read-only 12:50:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3b06c, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 487.467550][T11693] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (18 blocks) 12:50:14 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x20002902}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:50:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x39d0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 487.757263][T11693] EXT4-fs (loop3): filesystem is read-only [ 487.763676][T11701] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 487.771894][T11701] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 487.843802][T11693] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (18 blocks) [ 487.930404][T11701] F2FS-fs (loop1): invalid crc value [ 487.935875][T11701] attempt to access beyond end of device [ 487.941938][T11701] loop1: rw=12288, want=8200, limit=8192 [ 487.947715][T11701] F2FS-fs (loop1): Failed to get valid F2FS checkpoint [ 487.996231][T11712] EXT4-fs (loop4): Test dummy encryption mode enabled [ 488.003276][T11712] EXT4-fs (loop4): filesystem is read-only [ 488.011886][T11712] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (118 blocks) 12:50:15 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x7fffee20}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 488.087288][T11712] EXT4-fs (loop4): Test dummy encryption mode enabled [ 488.094322][T11712] EXT4-fs (loop4): filesystem is read-only [ 488.180618][T11712] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (118 blocks) 12:50:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9167, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)) 12:50:15 executing program 1: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0xa5, 0x4, 0xbd, 0x40, 0x3eb, 0x2, 0xbac0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0xb5, 0x4, 0xb1, 0x0, [], [{{0x9, 0x5, 0x81}}]}}]}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f00000003c0)={0x44, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000440)={0x44, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 488.306078][T11718] EXT4-fs (loop5): Test dummy encryption mode enabled [ 488.313280][T11718] EXT4-fs (loop5): filesystem is read-only [ 488.375957][T11718] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (7 blocks) 12:50:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3b0d8, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 488.507800][T11718] EXT4-fs (loop5): Test dummy encryption mode enabled [ 488.515060][T11718] EXT4-fs (loop5): filesystem is read-only [ 488.524691][T11718] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (7 blocks) 12:50:15 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137", 0x21}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) 12:50:16 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x8d6}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 488.827305][T11731] EXT4-fs (loop3): filesystem is read-only [ 488.848215][T11731] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (18 blocks) 12:50:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3aa4, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 488.942540][T11731] EXT4-fs (loop3): filesystem is read-only [ 488.950405][T11731] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (18 blocks) [ 489.129575][ T8487] usb 2-1: new high-speed USB device number 4 using dummy_hcd 12:50:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)) [ 489.198546][T11742] EXT4-fs (loop4): Test dummy encryption mode enabled [ 489.205715][T11742] EXT4-fs (loop4): filesystem is read-only [ 489.228406][T11742] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (118 blocks) [ 489.315029][T11742] EXT4-fs (loop4): Test dummy encryption mode enabled [ 489.322102][T11742] EXT4-fs (loop4): filesystem is read-only [ 489.332558][T11742] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (118 blocks) [ 489.490478][T11751] EXT4-fs (loop5): Test dummy encryption mode enabled [ 489.500051][T11751] EXT4-fs (loop5): filesystem is read-only [ 489.507239][ T8487] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 489.518194][ T8487] usb 2-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 489.527562][ T8487] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 12:50:16 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x20002962}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 489.542486][ T8487] usb 2-1: config 0 descriptor?? 12:50:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3b144, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 489.634226][T11757] EXT4-fs (loop3): filesystem is read-only [ 489.641789][T11757] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (64 blocks) [ 489.642213][T11751] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (7 blocks) [ 489.720165][ T8487] rc_core: IR keymap rc-hauppauge not found [ 489.726249][ T8487] Registered IR keymap rc-empty [ 489.748391][T11757] EXT4-fs (loop3): filesystem is read-only [ 489.760430][ T8487] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/rc/rc0 [ 489.772837][ T8487] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/rc/rc0/input5 [ 489.808048][T11757] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (64 blocks) 12:50:17 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137", 0x21}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) [ 489.928968][T11751] EXT4-fs (loop5): Test dummy encryption mode enabled [ 489.936152][T11751] EXT4-fs (loop5): filesystem is read-only [ 490.055152][T11751] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (7 blocks) 12:50:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x30000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)) 12:50:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3b10, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:50:17 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x7fffedde}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 490.308084][T11773] EXT4-fs (loop4): Test dummy encryption mode enabled [ 490.317762][T11773] EXT4-fs (loop4): filesystem is read-only [ 490.418457][ T8487] usb 2-1: USB disconnect, device number 4 [ 490.436425][T11773] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (118 blocks) [ 490.603386][T11773] EXT4-fs (loop4): Test dummy encryption mode enabled [ 490.610721][T11773] EXT4-fs (loop4): filesystem is read-only [ 490.636880][T11790] EXT4-fs (loop3): filesystem is read-only [ 490.658879][T11790] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (96 blocks) [ 490.677242][T11773] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (118 blocks) [ 490.746234][T11790] EXT4-fs (loop3): filesystem is read-only [ 490.759249][T11790] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (96 blocks) [ 490.897815][T11795] EXT4-fs (loop5): Test dummy encryption mode enabled [ 490.904932][T11795] EXT4-fs (loop5): filesystem is read-only [ 491.002338][T11795] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (7 blocks) [ 491.189688][ T8487] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 491.560432][ T8487] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 491.570740][ T8487] usb 2-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 491.580526][ T8487] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 491.611666][ T8487] usb 2-1: config 0 descriptor?? [ 491.719612][ T8487] rc_core: IR keymap rc-hauppauge not found [ 491.725669][ T8487] Registered IR keymap rc-empty [ 491.731836][ T8487] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/rc/rc0 [ 491.790547][ T8487] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/rc/rc0/input6 12:50:19 executing program 1: set_mempolicy(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) 12:50:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3b1ac, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:50:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3b78, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:50:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3e508, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)) 12:50:19 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137", 0x21}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) 12:50:19 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0x6}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 491.844752][ T8487] usb 2-1: USB disconnect, device number 5 [ 492.105594][T11831] EXT4-fs (loop3): filesystem is read-only [ 492.149640][T11832] EXT4-fs (loop5): Test dummy encryption mode enabled [ 492.159945][T11832] EXT4-fs (loop5): filesystem is read-only [ 492.202434][T11831] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (124 blocks) [ 492.237554][T11835] EXT4-fs (loop4): Test dummy encryption mode enabled [ 492.244657][T11835] EXT4-fs (loop4): filesystem is read-only 12:50:19 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0x8b4}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 492.267309][T11835] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (118 blocks) [ 492.322620][T11832] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (7 blocks) 12:50:19 executing program 1: r0 = getpid() sched_setattr(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) [ 492.473433][T11831] EXT4-fs (loop3): filesystem is read-only [ 492.482735][T11831] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (124 blocks) [ 492.486964][T11835] EXT4-fs (loop4): Test dummy encryption mode enabled [ 492.499614][T11835] EXT4-fs (loop4): filesystem is read-only [ 492.518408][T11832] EXT4-fs (loop5): Test dummy encryption mode enabled [ 492.525484][T11832] EXT4-fs (loop5): filesystem is read-only [ 492.536912][T11832] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (7 blocks) [ 492.557279][T11835] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (118 blocks) 12:50:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3e574, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)) 12:50:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3bdc, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:50:20 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e", 0x23}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) 12:50:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3b210, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:50:20 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xc01e}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:50:20 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 493.332426][T11857] EXT4-fs (loop3): filesystem is read-only [ 493.400362][T11857] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (124 blocks) [ 493.505859][T11863] EXT4-fs (loop5): Test dummy encryption mode enabled [ 493.512941][T11863] EXT4-fs (loop5): filesystem is read-only [ 493.566074][T11857] EXT4-fs (loop3): filesystem is read-only [ 493.597377][T11857] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (124 blocks) [ 493.643837][T11863] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (7 blocks) [ 493.678588][T11866] EXT4-fs (loop4): Test dummy encryption mode enabled [ 493.685582][T11866] EXT4-fs (loop4): filesystem is read-only [ 493.767453][T11866] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (118 blocks) [ 493.875414][T11863] EXT4-fs (loop5): Test dummy encryption mode enabled [ 493.878694][T11866] EXT4-fs (loop4): Test dummy encryption mode enabled [ 493.882566][T11863] EXT4-fs (loop5): filesystem is read-only [ 493.889489][T11866] EXT4-fs (loop4): filesystem is read-only [ 493.890918][T11866] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (118 blocks) 12:50:21 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)={0x4c, 0x12, 0x38095773ec5f3d0d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, 0xffffffff}}, 0x4c}}, 0x0) 12:50:21 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0x2000298d}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 494.017114][T11863] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (7 blocks) 12:50:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3e5e0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)) 12:50:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3d4c, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:50:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3b294, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:50:21 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e", 0x23}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) 12:50:22 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0x7fffedbc}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 494.852452][T11892] EXT4-fs (loop3): filesystem is read-only 12:50:22 executing program 1: r0 = open(&(0x7f0000000040)='./bus\x00', 0x8001145842, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x12, r0, 0x0) mlock(&(0x7f0000090000/0x3000)=nil, 0x3000) mlock(&(0x7f00005bd000/0x4000)=nil, 0x4000) mremap(&(0x7f000058c000/0x2000)=nil, 0x2000, 0x2000, 0x3, &(0x7f0000952000/0x2000)=nil) mlockall(0x1) [ 494.928806][T11892] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (124 blocks) [ 495.099722][T11898] EXT4-fs (loop5): Test dummy encryption mode enabled [ 495.106908][T11898] EXT4-fs (loop5): filesystem is read-only [ 495.157453][T11903] EXT4-fs (loop4): Test dummy encryption mode enabled [ 495.164601][T11903] EXT4-fs (loop4): filesystem is read-only [ 495.296149][T11898] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (7 blocks) [ 495.316432][T11903] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (118 blocks) 12:50:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3e648, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)) [ 495.467148][T11898] EXT4-fs (loop5): Test dummy encryption mode enabled [ 495.474481][T11898] EXT4-fs (loop5): filesystem is read-only [ 495.497589][T11903] EXT4-fs (loop4): Test dummy encryption mode enabled [ 495.504929][T11903] EXT4-fs (loop4): filesystem is read-only [ 495.576399][ T31] audit: type=1800 audit(1604580622.770:2): pid=11912 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=16227 res=0 errno=0 12:50:22 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0x6}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 495.628949][T11898] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (7 blocks) [ 495.652987][T11903] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (118 blocks) 12:50:23 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e", 0x23}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) 12:50:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3d88, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 496.067429][T11915] EXT4-fs (loop3): filesystem is read-only 12:50:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3b2d0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 496.141694][T11915] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (124 blocks) [ 496.312390][T11915] EXT4-fs (loop3): filesystem is read-only [ 496.328950][T11915] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (124 blocks) [ 496.609831][T11928] EXT4-fs (loop5): Test dummy encryption mode enabled [ 496.616741][T11928] EXT4-fs (loop5): filesystem is read-only [ 496.677171][T11928] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (7 blocks) [ 496.689046][T11930] EXT4-fs (loop4): Test dummy encryption mode enabled [ 496.696177][T11930] EXT4-fs (loop4): filesystem is read-only 12:50:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3e6ac, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)) [ 496.788527][T11930] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (118 blocks) [ 496.811234][T11928] EXT4-fs (loop5): Test dummy encryption mode enabled [ 496.818138][T11928] EXT4-fs (loop5): filesystem is read-only [ 496.857879][T11928] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (7 blocks) [ 496.998508][T11930] EXT4-fs (loop4): Test dummy encryption mode enabled [ 497.006043][T11930] EXT4-fs (loop4): filesystem is read-only [ 497.109059][T11930] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (118 blocks) 12:50:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3dbc, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:50:24 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e37", 0x24}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) 12:50:24 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0x8a7}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:50:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3b304, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 497.430071][T11943] EXT4-fs (loop3): filesystem is read-only [ 497.499780][T11943] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (124 blocks) [ 497.648645][T11943] EXT4-fs (loop3): filesystem is read-only [ 497.663518][T11943] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (124 blocks) 12:50:25 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0x200029cb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) [ 497.876535][T11954] EXT4-fs (loop5): Test dummy encryption mode enabled [ 497.883718][T11954] EXT4-fs (loop5): filesystem is read-only [ 498.056157][T11954] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (7 blocks) [ 498.167789][T11954] EXT4-fs (loop5): Test dummy encryption mode enabled [ 498.174923][T11954] EXT4-fs (loop5): filesystem is read-only [ 498.238035][T11961] EXT4-fs (loop4): Test dummy encryption mode enabled [ 498.245116][T11961] EXT4-fs (loop4): filesystem is read-only [ 498.268274][T11954] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (7 blocks) [ 498.352121][T11961] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (118 blocks) 12:50:25 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="0040000068020000973d00001200000000000000843d00000004000073564d38840300001e000000000000000010cc03020001005265497345723346730000000200000002", 0x45, 0x10000}, {&(0x7f0000011200)="0000020000000000000000001200000000000000843d00000004000073564d388403", 0x22, 0x3d96000}, {&(0x7f0000011300)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f0100010000000200000001000000f401000002003000a40f", 0x46, 0x3d97000}], 0x0, &(0x7f0000011500)) 12:50:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3e778, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)) 12:50:25 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002940)=""/34, 0x22}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0x7fffedaf}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x8}, 0x0) 12:50:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:50:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40002, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f0000d7830000000001000000000000000b0000000002000028020000028400001b71", 0x66, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 12:50:26 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e37", 0x24}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002600)=""/254, 0xfe}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000028c0)=""/66, 0x42}, {&(0x7f0000002980)=""/13, 0xd}, {&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/4109, 0x100d}, {&(0x7f00000001c0)=""/111, 0x6f}], 0x7}, 0x0) [ 499.048195][T11971] EXT4-fs (loop3): filesystem is read-only [ 499.146321][T11978] REISERFS (device loop1): found reiserfs format "3.5" with non-standard journal [ 499.157511][T11978] REISERFS (device loop1): using ordered data mode [ 499.164303][T11978] reiserfs: using flush barriers [ 499.177593][T11978] REISERFS (device loop1): journal params: device loop1, size 15748, journal first block 18, max trans len 1024, max batch 900, max commit age 0, max trans age 30 [ 499.180648][T11971] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (124 blocks) [ 499.216965][T11978] REISERFS (device loop1): checking transaction log (loop1) [ 499.233083][T11978] ===================================================== [ 499.240158][T11978] BUG: KMSAN: uninit-value in search_by_key+0x301e/0x67f0 [ 499.247281][T11978] CPU: 0 PID: 11978 Comm: syz-executor.1 Not tainted 5.9.0-rc8-syzkaller #0 [ 499.255950][T11978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 499.266009][T11978] Call Trace: [ 499.269309][T11978] dump_stack+0x21c/0x280 [ 499.273647][T11978] kmsan_report+0xf7/0x1e0 [ 499.278081][T11978] __msan_warning+0x5f/0xa0 [ 499.282594][T11978] search_by_key+0x301e/0x67f0 [ 499.287381][T11978] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 499.293540][T11978] ? kmsan_get_metadata+0x116/0x180 [ 499.298753][T11978] ? kmsan_internal_set_origin+0x85/0xc0 [ 499.304378][T11978] ? kmsan_get_metadata+0x116/0x180 [ 499.309585][T11978] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 499.315418][T11978] reiserfs_read_locked_inode+0x1fc/0x30b0 [ 499.321228][T11978] ? reiserfs_update_sd_size+0x1340/0x1340 [ 499.327028][T11978] ? reiserfs_read_locked_inode+0x30b0/0x30b0 [ 499.333112][T11978] ? kmsan_get_metadata+0x116/0x180 [ 499.338327][T11978] ? kmsan_internal_set_origin+0x85/0xc0 [ 499.343965][T11978] reiserfs_fill_super+0x2ad7/0x6160 [ 499.349245][T11978] ? kmsan_get_metadata+0x116/0x180 [ 499.354430][T11978] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 499.360225][T11978] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 499.366357][T11978] ? set_blocksize+0x464/0x780 [ 499.371114][T11978] ? kmsan_get_metadata+0x116/0x180 [ 499.376305][T11978] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 499.382101][T11978] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 499.388242][T11978] ? sb_set_blocksize+0x1c5/0x230 [ 499.393343][T11978] mount_bdev+0x619/0x900 [ 499.397660][T11978] ? reiserfs_kill_sb+0x260/0x260 [ 499.402676][T11978] get_super_block+0xc9/0xe0 [ 499.407269][T11978] legacy_get_tree+0x163/0x2e0 [ 499.412021][T11978] ? remove_save_link+0x600/0x600 [ 499.417034][T11978] ? legacy_parse_monolithic+0x310/0x310 [ 499.422670][T11978] vfs_get_tree+0xd8/0x5d0 [ 499.427124][T11978] path_mount+0x3dde/0x5db0 [ 499.431626][T11978] do_mount+0x1c6/0x220 [ 499.435815][T11978] __se_compat_sys_mount+0x7bb/0xaa0 [ 499.441185][T11978] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 499.447242][T11978] __ia32_compat_sys_mount+0x62/0x80 [ 499.452519][T11978] __do_fast_syscall_32+0x129/0x180 [ 499.457705][T11978] do_fast_syscall_32+0x6a/0xc0 [ 499.462547][T11978] do_SYSENTER_32+0x73/0x90 [ 499.467131][T11978] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 499.473444][T11978] RIP: 0023:0xf7f14549 [ 499.477501][T11978] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 499.497094][T11978] RSP: 002b:00000000f550df20 EFLAGS: 00000292 ORIG_RAX: 0000000000000015 [ 499.505582][T11978] RAX: ffffffffffffffda RBX: 00000000f550df7c RCX: 0000000020000100 [ 499.513554][T11978] RDX: 0000000020000040 RSI: 0000000000000000 RDI: 00000000f550dfbc [ 499.521526][T11978] RBP: 00000000f550df7c R08: 0000000000000000 R09: 0000000000000000 [ 499.529483][T11978] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 499.537449][T11978] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 499.545409][T11978] [ 499.547722][T11978] Local variable ----key@reiserfs_read_locked_inode created at: [ 499.555346][T11978] reiserfs_read_locked_inode+0xb4/0x30b0 [ 499.561056][T11978] reiserfs_read_locked_inode+0xb4/0x30b0 [ 499.566755][T11978] ===================================================== [ 499.573929][T11978] Disabling lock debugging due to kernel taint [ 499.580062][T11978] Kernel panic - not syncing: panic_on_warn set ... [ 499.586638][T11978] CPU: 0 PID: 11978 Comm: syz-executor.1 Tainted: G B 5.9.0-rc8-syzkaller #0 [ 499.596764][T11978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 499.606802][T11978] Call Trace: [ 499.610116][T11978] dump_stack+0x21c/0x280 [ 499.614439][T11978] panic+0x4c8/0xea7 [ 499.618340][T11978] ? add_taint+0x17c/0x210 [ 499.622747][T11978] kmsan_report+0x1da/0x1e0 [ 499.627244][T11978] __msan_warning+0x5f/0xa0 [ 499.631745][T11978] search_by_key+0x301e/0x67f0 [ 499.636512][T11978] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 499.642652][T11978] ? kmsan_get_metadata+0x116/0x180 [ 499.647842][T11978] ? kmsan_internal_set_origin+0x85/0xc0 [ 499.653462][T11978] ? kmsan_get_metadata+0x116/0x180 [ 499.658676][T11978] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 499.664474][T11978] reiserfs_read_locked_inode+0x1fc/0x30b0 [ 499.670288][T11978] ? reiserfs_update_sd_size+0x1340/0x1340 [ 499.676092][T11978] ? reiserfs_read_locked_inode+0x30b0/0x30b0 [ 499.682150][T11978] ? kmsan_get_metadata+0x116/0x180 [ 499.687340][T11978] ? kmsan_internal_set_origin+0x85/0xc0 [ 499.692968][T11978] reiserfs_fill_super+0x2ad7/0x6160 [ 499.698247][T11978] ? kmsan_get_metadata+0x116/0x180 [ 499.703432][T11978] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 499.709250][T11978] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 499.715305][T11978] ? set_blocksize+0x464/0x780 [ 499.720060][T11978] ? kmsan_get_metadata+0x116/0x180 [ 499.725252][T11978] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 499.731050][T11978] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 499.737191][T11978] ? sb_set_blocksize+0x1c5/0x230 [ 499.742207][T11978] mount_bdev+0x619/0x900 [ 499.746525][T11978] ? reiserfs_kill_sb+0x260/0x260 [ 499.751541][T11978] get_super_block+0xc9/0xe0 [ 499.756119][T11978] legacy_get_tree+0x163/0x2e0 [ 499.760888][T11978] ? remove_save_link+0x600/0x600 [ 499.765899][T11978] ? legacy_parse_monolithic+0x310/0x310 [ 499.771519][T11978] vfs_get_tree+0xd8/0x5d0 [ 499.775925][T11978] path_mount+0x3dde/0x5db0 [ 499.780508][T11978] do_mount+0x1c6/0x220 [ 499.784658][T11978] __se_compat_sys_mount+0x7bb/0xaa0 [ 499.789939][T11978] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 499.796022][T11978] __ia32_compat_sys_mount+0x62/0x80 [ 499.801310][T11978] __do_fast_syscall_32+0x129/0x180 [ 499.806501][T11978] do_fast_syscall_32+0x6a/0xc0 [ 499.811344][T11978] do_SYSENTER_32+0x73/0x90 [ 499.815925][T11978] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 499.822236][T11978] RIP: 0023:0xf7f14549 [ 499.826295][T11978] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 499.845915][T11978] RSP: 002b:00000000f550df20 EFLAGS: 00000292 ORIG_RAX: 0000000000000015 [ 499.854314][T11978] RAX: ffffffffffffffda RBX: 00000000f550df7c RCX: 0000000020000100 [ 499.862272][T11978] RDX: 0000000020000040 RSI: 0000000000000000 RDI: 00000000f550dfbc [ 499.870228][T11978] RBP: 00000000f550df7c R08: 0000000000000000 R09: 0000000000000000 [ 499.878189][T11978] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 499.886145][T11978] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 499.894908][T11978] Kernel Offset: disabled [ 499.899233][T11978] Rebooting in 86400 seconds..