ostdata={'hostdata', 0x3d, '!'}}]}) [ 1043.918218] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1043.946912] EXT4-fs (loop7): Test dummy encryption mode enabled 03:45:02 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1043.963849] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1043.985536] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1043.990062] gfs2: not a GFS2 filesystem [ 1043.998068] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1044.007554] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1044.028160] attempt to access beyond end of device [ 1044.040552] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:02 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000300"}, &(0x7f0000000080)=0x1e) [ 1044.073200] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1044.087378] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1044.097872] loop5: rw=12288, want=8200, limit=20 [ 1044.103595] attempt to access beyond end of device [ 1044.108679] loop5: rw=12288, want=12296, limit=20 [ 1044.114950] attempt to access beyond end of device 03:45:02 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1044.120369] loop5: rw=12288, want=8200, limit=20 [ 1044.125518] attempt to access beyond end of device [ 1044.131629] loop5: rw=12288, want=12296, limit=20 [ 1044.151803] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1044.181889] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1044.190367] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1044.195033] attempt to access beyond end of device [ 1044.201744] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1044.210361] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1044.217987] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:45:02 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000000c0)=""/217, &(0x7f0000000000)=0xd9) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x10, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) [ 1044.233573] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x200000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:03 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000500"}, &(0x7f0000000080)=0x1e) [ 1044.274269] loop5: rw=12288, want=8200, limit=20 [ 1044.290649] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1044.299572] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1044.302829] attempt to access beyond end of device 03:45:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1044.341718] loop5: rw=12288, want=12296, limit=20 [ 1044.348494] attempt to access beyond end of device [ 1044.360096] loop5: rw=12288, want=8200, limit=20 [ 1044.368319] attempt to access beyond end of device [ 1044.374530] loop5: rw=12288, want=12296, limit=20 [ 1044.385912] IPVS: length: 217 != 8 03:45:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000070000c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1044.393797] IPVS: length: 217 != 8 03:45:03 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c006c000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010708000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:03 executing program 2: socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:03 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000002010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:03 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xece9, 0x400) ioctl$DRM_IOCTL_MODE_GETCRTC(r1, 0xc06864a1, &(0x7f0000000100)={&(0x7f00000000c0)=[0xffffffffffffffff, 0x5f63], 0x2, 0x81, 0x10000, 0x10000, 0xc4b7, 0x100000001, {0x1, 0x1, 0x7a1, 0x0, 0x4, 0x4, 0x200, 0x964, 0x6, 0x0, 0xfffffffffffffffc, 0x4, 0x100000001, 0xf45d, "0d03cda7d4fd2aa44a9641780583f24fa31e77250bbb7aab8175626c949d000b"}}) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x10, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) socket$bt_hidp(0x1f, 0x3, 0x6) 03:45:03 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000200"}, &(0x7f0000000080)=0x1e) [ 1044.622651] gfs2: not a GFS2 filesystem 03:45:03 executing program 2: socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1044.708873] attempt to access beyond end of device [ 1044.720593] gfs2: not a GFS2 filesystem [ 1044.735917] loop5: rw=12288, want=8200, limit=20 03:45:03 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000200"}, &(0x7f0000000080)=0x1e) [ 1044.756462] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1044.756690] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1044.767927] attempt to access beyond end of device [ 1044.786055] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:45:03 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") inotify_add_watch(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) [ 1044.804469] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1044.808059] loop5: rw=12288, want=12296, limit=20 [ 1044.821340] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1044.821973] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:45:03 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x10, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) [ 1044.879935] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1044.914961] attempt to access beyond end of device 03:45:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x300000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1044.923858] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1044.928626] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1044.950266] loop5: rw=12288, want=8200, limit=20 [ 1044.959978] attempt to access beyond end of device [ 1045.006926] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1045.011140] loop5: rw=12288, want=12296, limit=20 [ 1045.014035] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1045.077796] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000090000c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:03 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) [ 1045.134697] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1045.143365] attempt to access beyond end of device [ 1045.196349] loop5: rw=12288, want=8200, limit=20 [ 1045.213613] attempt to access beyond end of device 03:45:03 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x10, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) recvfrom$inet6(r0, &(0x7f00000000c0)=""/255, 0xff, 0x20, &(0x7f0000000000)={0xa, 0x4e20, 0x1, @mcast2, 0x6}, 0x1c) 03:45:03 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000040), &(0x7f0000000080)=0x40) [ 1045.244351] gfs2: not a GFS2 filesystem [ 1045.255358] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1045.262352] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1045.281486] loop5: rw=12288, want=12296, limit=20 03:45:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010021000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1045.308148] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1045.325965] attempt to access beyond end of device [ 1045.334133] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1045.355328] loop5: rw=12288, want=8200, limit=20 [ 1045.379546] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1045.389255] attempt to access beyond end of device [ 1045.419325] loop5: rw=12288, want=12296, limit=20 03:45:04 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000230900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:04 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) 03:45:04 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00002d010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:04 executing program 0: r0 = socket$inet6(0xa, 0x8002, 0x8) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x10, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x20000, 0x0) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x100000000, 0x7, 0x3000}, 0x4) 03:45:04 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000240)=""/11, 0x4) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = dup(r0) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x0) 03:45:04 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) [ 1045.594505] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1045.601650] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1045.609343] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1045.655317] gfs2: not a GFS2 filesystem [ 1045.681380] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1045.720181] f2fs_msg: 50 callbacks suppressed [ 1045.720194] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:45:04 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x10, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1f, 0x4000) write$eventfd(r1, &(0x7f00000000c0)=0x2, 0x8) [ 1045.730108] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:45:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000480000c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1045.793107] gfs2: not a GFS2 filesystem [ 1045.794323] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1045.803650] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1045.827805] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1045.836911] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1045.850072] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010000001000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1045.946483] attempt to access beyond end of device 03:45:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x4, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:04 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000400"}, &(0x7f0000000080)=0x1e) [ 1045.981543] loop5: rw=12288, want=8200, limit=20 [ 1045.995936] attempt to access beyond end of device [ 1046.010778] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1046.034371] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1046.046134] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1046.063583] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1046.075026] loop5: rw=12288, want=12296, limit=20 [ 1046.079299] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1046.106090] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1046.119230] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 1046.155106] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1046.168082] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1046.183328] gfs2: not a GFS2 filesystem [ 1046.195187] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock 03:45:04 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x119d) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x10, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) [ 1046.206655] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:45:04 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00008f000008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1046.260346] attempt to access beyond end of device [ 1046.275434] gfs2: not a GFS2 filesystem [ 1046.282239] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1046.288837] EXT4-fs (loop4): Unsupported filesystem blocksize 67108864 (16 log_block_size) [ 1046.291494] loop5: rw=12288, want=8200, limit=20 03:45:05 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000200"}, &(0x7f0000000080)=0x1e) [ 1046.324040] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1046.344528] attempt to access beyond end of device [ 1046.372417] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1046.387663] loop5: rw=12288, want=12296, limit=20 03:45:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x6c00, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1046.434020] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 1046.448704] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1046.500929] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1046.536358] EXT4-fs (loop4): Unsupported filesystem blocksize 67108864 (16 log_block_size) [ 1046.549564] EXT4-fs (loop7): Test dummy encryption mode enabled 03:45:05 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0021dd0900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:05 executing program 0: r0 = socket$inet6(0xa, 0x0, 0xffffffffffffff00) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) r2 = geteuid() fstat(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000300)='/dev/loop0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='fuseblk\x00', 0x40040, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x4}}, {@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x9}}]}}) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x10, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000680)='/dev/snapshot\x00', 0x101040, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f00000006c0)=""/54) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000700)='./file0\x00', 0x1, 0x1, &(0x7f0000000180), 0x4000, &(0x7f0000000280)={[{@codepage={'codepage', 0x3d, 'cp932'}}, {@gid={'gid', 0x3d, r4}}, {@type={'type', 0x3d, "929a8b9e"}}, {@dir_umask={'dir_umask', 0x3d, 0x50e}}, {@creator={'creator', 0x3d, "b45f6891"}}, {@iocharset={'iocharset', 0x3d, 'macinuit'}}]}) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='blksize'}, 0x10) ioctl$KVM_HAS_DEVICE_ATTR(r6, 0x4018aee3, &(0x7f0000000640)={0x0, 0x3ff, 0x81, &(0x7f0000000600)=0x40}) 03:45:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff00000000fc00c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:05 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000500"}, &(0x7f0000000080)=0x1e) [ 1046.612599] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1046.631265] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1046.670512] attempt to access beyond end of device [ 1046.675593] loop3: rw=4096, want=136, limit=54 03:45:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010012000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1046.715587] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1046.744706] gfs2: error 10 reading superblock [ 1046.762443] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1046.770528] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1046.808151] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1046.815583] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1046.832285] attempt to access beyond end of device [ 1046.861365] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1046.896599] loop3: rw=4096, want=136, limit=54 [ 1046.916275] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1046.924237] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1046.935438] gfs2: error 10 reading superblock [ 1046.941379] attempt to access beyond end of device [ 1046.959405] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1046.986954] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1047.000194] loop5: rw=12288, want=8200, limit=20 [ 1047.015605] attempt to access beyond end of device [ 1047.035924] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1047.050070] loop5: rw=12288, want=12296, limit=20 [ 1047.055264] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 1047.105375] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1047.113108] attempt to access beyond end of device [ 1047.118035] loop5: rw=12288, want=8200, limit=20 [ 1047.122945] attempt to access beyond end of device [ 1047.127892] loop5: rw=12288, want=12296, limit=20 [ 1047.249051] attempt to access beyond end of device [ 1047.272178] loop5: rw=12288, want=8200, limit=20 [ 1047.277049] attempt to access beyond end of device [ 1047.282651] loop5: rw=12288, want=12296, limit=20 [ 1047.288458] attempt to access beyond end of device [ 1047.306453] loop5: rw=12288, want=8200, limit=20 [ 1047.311472] attempt to access beyond end of device [ 1047.316423] loop5: rw=12288, want=12296, limit=20 03:45:07 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:07 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) 03:45:07 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = memfd_create(&(0x7f00000000c0)='\x00', 0x2) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000100)="f13d29cb2df5255d09fa0c7e31c0c4e4cd23660ead02c317c7f82561d987c1fdf53a9c489540392daa814afb82115b20c782ed568b781ebee81778d8baf24823a6ac3ccba10e190f34d0792acafb973e4075e6e23041e69d8618ea348179fe4c205c522b0a5d0d66f8bdebcc8bf1a96aaa96b62e49be854a1a1be90960833574f3856a85c74ccdd503cb8628839a8c574fbeee0764d8d0b581117dd6f53a95c4ca76c7a7ba947217eb8a819530ee4caec696a4309763e8fa97f754d907e4f3ca0d3afa776e855018c5d3e533cf3ebf6ef777826d23f741c2b2aa54cf6e124e70392d8a8e5c5f4c3044cfc09a976e0c7d29010f5a9e55ef", &(0x7f0000000200)=""/68}, 0x18) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x10, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) 03:45:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff0000000fff00c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x8cffffff, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:07 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000008000008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010053000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:07 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000030900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1048.727496] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1048.742704] attempt to access beyond end of device [ 1048.766937] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1048.778581] gfs2: not a GFS2 filesystem [ 1048.785798] loop5: rw=12288, want=8200, limit=20 [ 1048.802153] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:45:07 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) [ 1048.832143] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1048.838522] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1048.844320] attempt to access beyond end of device [ 1048.867547] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1048.868100] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1048.887392] loop5: rw=12288, want=12296, limit=20 [ 1048.902592] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1048.913586] attempt to access beyond end of device [ 1048.916522] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1048.920542] loop5: rw=12288, want=8200, limit=20 03:45:07 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x2, 0x0, @loopback}, &(0x7f00000000c0)=0x10, 0x800) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={0x0, 0x4}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000180)={0x1, 0x200, 0x8, 0xe27, r2}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='wlan0user\x00', r3}, 0x10) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000280)=0x80000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) 03:45:07 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1048.940519] attempt to access beyond end of device [ 1048.945480] loop5: rw=12288, want=12296, limit=20 [ 1048.952452] gfs2: not a GFS2 filesystem [ 1049.014611] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1049.037136] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1049.053562] EXT4-fs (loop1): Test dummy encryption mode enabled 03:45:07 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) 03:45:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x4c00, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1049.103461] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1049.125770] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:45:07 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0006000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1049.170133] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1049.177822] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1049.186793] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1049.206679] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:07 executing program 0: 03:45:07 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) 03:45:07 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000b000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000ffe000c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:08 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000250008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:08 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000500"}, &(0x7f0000000080)=0x1e) [ 1049.395706] attempt to access beyond end of device [ 1049.415481] loop3: rw=4096, want=136, limit=38 03:45:08 executing program 0: r0 = socket$inet6(0xa, 0x800, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x10, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) [ 1049.472434] attempt to access beyond end of device [ 1049.491690] gfs2: error 10 reading superblock [ 1049.499143] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1049.513968] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1049.551367] loop5: rw=12288, want=8200, limit=20 [ 1049.567007] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1049.608090] attempt to access beyond end of device [ 1049.628818] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1049.643176] attempt to access beyond end of device [ 1049.650955] EXT4-fs (loop7): Test dummy encryption mode enabled 03:45:08 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) [ 1049.675181] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1049.684537] loop3: rw=4096, want=136, limit=38 [ 1049.702662] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1049.705048] loop5: rw=12288, want=12296, limit=20 [ 1049.721033] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:45:08 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1049.742844] gfs2: error 10 reading superblock [ 1049.753872] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1049.765741] attempt to access beyond end of device [ 1049.787397] loop5: rw=12288, want=8200, limit=20 [ 1049.841750] attempt to access beyond end of device 03:45:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1049.871788] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1049.886507] loop5: rw=12288, want=12296, limit=20 [ 1049.891745] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1049.891802] EXT4-fs (loop7): Test dummy encryption mode enabled 03:45:08 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x10, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) r1 = add_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r2 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000180)="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", 0x1000, 0xfffffffffffffffc) r3 = request_key(&(0x7f0000001180)='rxrpc_s\x00', &(0x7f00000011c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000001200)='ipvs\x00', 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000001240)={r1, r2, r3}, &(0x7f0000001280)=""/4096, 0x1000, &(0x7f00000032c0)={&(0x7f0000002280)={'sha3-512\x00'}, &(0x7f00000022c0)="515182ccaccf5230c6d9254d3c218d08174e3242642f8bcbf402e502e38e17aff01c908b6f2f915cb73208ebe2e9f3428e17c63a56469e7053b773328fee0e9025e06fe5eebed267c73458709dbdbbc0a5e8152d72fba23e75718e3aa605c3fff561f03133d21b1564ae7170ca6548b11925eb25a4cb334a8d7d9a32a730683300c54a8f685d57f8dcd60dabdc5cf487e0ff0ec612a0f9df1de9ac2f4042a136542dc51ac4eefa98934f13f399a16f873e5ed4b00460dd513a1d07c2faaf912b720ee7903e2a5f321700ff5096b42783731c53b3289cf42f8dcc2cbcfb4147625cbe6c127e44dc4ef10727ff9500d8c0233e15f6378096046e51ae12145ab1c13374d1eaaf96cdc979ac7d92999dca7c0cc5fa02c9894056f6fd071a2cf654960fb480950d41be370d37565be82aa260cfe410d5d1edeeaf8e0bf168c08916b4f9c46c6f6b0aa97bfc23aa8cf36f03afbeeedeaa0c3adc17224baf71978966ef9ba57031f8f00adb7665a1f1926aa39bd696bd747c22c7ed7d36c8358da643e8d619448c6285865ba0bc781c5198797fdeb69b9b49497058b8c6fa05f64ed1b765e2dbf24ff4d0a48326c961e6753002573a19b5f59fda66019b4e4877a2bc9b9c97416087aaebfab21665895693e8994272edd6992970652fc09b73b79156d12d2380fcdde2f44fbe91011c211c1ac6e1296a153b804b71a3fe3a557954e07b72f5121b2abacf256606b29d80173bc707f07f5b649214667738bb4d4359d390b5eb21fa96006bf936e6b536eefe79a7747267102a4c87a1a72bd12c2744a746e8f8f6c56078112cf5bee465e5c1f9d475d7ec111d098316dba63c21bbca2d550141bb8a7a5f6ba3f04799eb9224917e3ecee8d56183bcfede5c67857faa1a93b766212ca30e7e7f208522aa1e81e9d2ff9c549ad301f6d91313ee080a60289f5f4e9c8a5a1bb0378c103698c3b10e77a07a104eedf232451511617067a9742663476c4c8811b53e14730c19aec054d5c187bde52bbaf579774c490db9bfc6e85e8c015633f0214c3b3d6c78d0ab1936d03cea939cd6c112396bc1425fc3536ef3a7442f033518dfc1b7f1d4f6e8db1fd947a5177c080c0a426dc9ad4c1243aed6ef81bd86c3c52b67768852026bdd46ac089e49968a2ff8c562a2b1773661d566e085e655069a79a8cf2a662cff04ca85fdee2e45f77d7f7da3d0f9bf96822c4846c29ca7ead2fdc25939d6bf8546391afc448413bab661a1f861c5e2e7bba032be63f51620baca3634b850af220aea78c83bf21992bd0c8a11ede2333535e2976c0bc0a47d7cf2fcbea0e1780e10e68d3df9a9c43732d2833b82cd2129a1aa1c10ac083ef8cea9aab703f4db0a454bbc20bce86f50ff3275dca999bff1a82aef05141f6bb1169535f0699aa5333ea59ff9274aa0a348da12364263c6a1637f19ac2e3a876d7b443903cda7b78fc5aaa90d5d3acfdd9b197a0fff6977b28478b71ba72dc26702be21a8f7204135ab8520c4c51ae6f629f4ec03ea40e3583c0a6a2d057c2c8bdaee8ac77ec4cd92fd43fed0f6c166a1773e78e324a4ba0d7b77c0981919e8151ce38530405110fa5e8a1dc7a1262fbc5149357ea77c2f9316fb253cf6da847eb3ec48572e50c45b8e30139acf8e419dc162f60760df945768f2e26f8d9c6b2abfb2cb6f76d3a32c09aaba847d29c92893579939e05baca563112849c873082fdb231a1d2714f2b3a7df7904e60d8cfbf7ac05123c829ff69dfdb2dd4d60f7eecf1fb79787c81aa8c4a8c744a0e820618b2aa924f873facdd29ef33c84826650dbd4ea49cf0515d51803fa29fa1b2cb9b290569a7434512bb529f2155ae64b841cb08d8628ad29cb8845007401d2e8b7e0790b6ab5b0df071d0a11211af90a07426532597bbaecfd8f0d4654c0a252ed9e145a4b09dd872000f1ea4300f9f67e8038f569b71b8c952d55be66af9521f51f5f514fde8d6354a8357a9e8527e9f5e8b8bfbed0a9e70ddac304c4868d65b477784eeb08a5872631f41199802494dc176a31216d8ddf9822eef0d09dd394e8a93c569c693669265951f17c2025149c2556b1d210a0e1f3df7e0d6ccddc2dbe917c1b7ce30afcad54da9eddfafc2d47c62ee0bd62eca5a9e016c6eed066f2b4fb5a31a57abbfd508b5b14d20544669d5488e8490670810ab460dcede548b998235e106d17f02fb67f3514a6313914fa635d47598f503f9677714aaefec9374ab6918c361fe89fd2f6784a14936c84ff4c166a74055be41dadbd04396cba9c52e1559b74bc415c4f7ca8b9748e4710cd32d71827f2c06d4ccaaafe487dcfd69298fa48f5d32fce110de470659371fd23b44008486f1fc20fd9c9f940b86c1e12e9d5bcaaffb401241744f00a40b2193fa30140cdafd637856930c5075ae7c50c1b8f4d56c5289b5a0fe2860aea86e8b1cc2f6d97ed7a30c8b1761993a250e165e55bd5584f4033f7ef05ba0446515be1abd9d34acda7668add67746d6b3b9aefa9bc36419df7430e9cc285548a3b91b167c7caa8781de806fa45df92fccf6df9f4edc1c9a5b216e51cdca9a460ee7894bc3e7b388209a4d695f939fab3be340ca6686f84dc2e46dd94294f970ef6b807696e2914fe3a90637abdbdeafdb4cd1029f53b62e8ff28b7bba0fa88bbd20b7727cc9f6b7ad116755376d1b490bb01c25e89728c5c43ec2376bcc0582ec853f343258171a2fdfb57560d5871387b28dd9dc0aabef94e27e019eaea1339c27461781b2e3764ebb191325e98b1ad93a0b754fd4c49ab36f738775473c5005166454510f9057152bdc8afcd48359f0b7b08101d7f4b2451ced9fd2b159fbb8c45ca1ea51aa501364d0dbaf4c94092ab06d25af9c4dcf055ce977eee01f4920018b159dbdda4ce7c8f65fc8d9322271f243beebd6333dee2444158ecc200b7106b9350a6c0d26986a6f563294877818ead0910d7bb5e427eb7f8b034d633f6e105fb3a8726d27082d827f35b1720fd01aab4619a13a3cffb8a1bbf8f90c22f63512298113f41d36a0adc17978de0d1746b2ed6383ab65ba98796aa671c03eda5b56420a6e201dc9cda6495c06bbf2266130985cf5ca15941cff1cfa122ebddbc7a75f40734b019dd6cd49e1d2456ced51555b71490ea79c13b2d39ebd327f8bd61d38f6c253f0a1883c1e3759df094d7e3fe408d06cc343f63cbac2033dba79c2e2f481866ee6be760a7a2f76bcd0bd99f2f9fda4f1a59035a6551abfe0af2aceba9d49ac674b227da38c744f65bdc570c3341a731a3cc6ad79f4782977ea810d0f06b5c5451ad0eabf6b8727f6450997651ef25fe0f129d7d95fa1e2e8fc9dc6f58e3e4218806a908956024a1426f91d0afb771c8c3c9b49075ea78afa25b8fb3127b2c438cc1b70285619f218c919d5d460f5adbe4f4e95026b8c13ceece4908276d5170bcc000801d90e362d0c122b15ccd902abf3023796f8de4577ab5db6d7c77aee35adbe9a54aae8c8c209fabcca46b2f6a1daf4194287598a5df29d94d3d22567f0bbc90368fa30ba063e2fa80bf5c01f88283f63bf97ea4cecbb9e8ca2624c2ffa8ca2f97b9d904916b57d07acceff3d7603d92c879918d0aa4907f3b174acd12b4060b948cc3ea5cab9d93643fa621e372aaa960528c3b09f6ac429d52443baca2f58a32876d90b837892319e00eeaa779a27be8a921cd113bf1956395f609cb00455faa3789c45ec13acfafca52a8c011ded44087846119334287432a8a9515974058198d027e9ad7c17fcaa2cfdf5f216f06f85a71239fd89dfc30aeecd02c446a9adfb4500139bd7c7c5319fe28b0b33a77f83051671759b2c71dece4f3629a41084a6ccaa504557c608fcf178b52b356660564d93e4fbc83f1cd65b6ab713e87ba1eacc003797754940823755c0cdbb44327e1f7c00f8e09985fa0653f03d51e5d5ad0b9ea64f032ccf24ff6806358ea9921665afcf06f28d2456fd324a3f03eaa676697b6e4d87aa6d5f22bdbb88b764138ce7896115569ff66f3abcc61ee8a2d6b44c72a2b9ece9041dedf4a07e1e25955dea7a06b60d3b85362f975d9136102228aa08d9a1c1590c4037046242404a0c4fce388ce516d26788364191c7239b90d08cc7abcf58b4fbb84d1bb39e20117f861109afc43e8917035fe24310c301afcb0ccf188f072144e20d3eadf3ee1e830d9d27f90029aecd436fd20b1b65c430d5855f3a986ea8276d55dacb72b4ed27d35e5794760e42f720bfb5b17136a58eb6604fbcbe059e137ddbf918f6627d7e1d76efcf148c05dbb7575e619ccdb3461b7c55990d1b0baf42c3190fe33f897cde8b510641acc9f4969fedadb3f4290e4cff3e71c901af576b19e3e415332d2d2dcff3d950db2c8e3f848aae6741cadd1dcda19faf34fe9bfc2f4a44ee4e5c627eae996f5e48799b765a0dff3d1117a132fe3380bc3304e844256d0d517a6297cb417ab322b9c50a70fd182fb2a30982d88e73f336ce5d1651fa5488bc61c9a0b9a43d571683828a1ffbf7e5e2e6c349f65f1c9d1856601727e20a69ed38818c31e7ede2c7986d6a944299feb259e8c20b99d3140cbd249b626debe328f8b9dca91b96e27eb0e2dad016b7344f784685f80b37f5009e0afd242eb5a7c861963b25c89a3d368dd8a8f23adebd5fa00078c31d8a7ba6ec41476ba9e25995344d365b31edcb34298cea7d820932a403c4304978db966e17a5b6e61f5508d31a548f5be0d43a3a081e85a2c5c107cc90e507f93e078b4e9a2baec595455859bb8438ec89ce9a7038baf8a2501f8796d424096e0d44d8728b179e9ade60437dd6b32e06e2bd3a7339576bd5867fac113c10d8f146afb83add17142d3eb890e726c6867a61ef8959c6c4bc411ec063615f487dfd3c46f743ff97907814ac7604188c21346055d29a53dba636cf3f9b9ffd6aba263ab18fb41094ad9198b4ec4efc6638803416c83adf14bcd1b40fb316c4898a5960c7564b23ac9b27fbda455460f7cc9701aafc2389b50e4d0661c67aca116137f4e1193467d2baa630e8d2ab6e230e05eb068aa545b994a74db4fdbf596512bbaa7c7639ec50fa40585d7bf7812b978e911d51a4a11ed6769bc0c64f88990aef9b9d924fc82b8c619bdec76a4a1ef27ee8fd1c175465e2f613f6d2160d01afa53222cbb58be80dcbbb5002c71040f284bf1396753c7fae3e788c2437a6e5002d4554864c2280c275c96a84df3e694ea8f5100093676b5698a7ed2fe2a1f3d4442bf18ece5862b0eb9b53aea1bdb1b72c869ba54fcd8b0dfa7603d9972bb9bf1f67f112059f4c1fcb93dc8116028535fba0ede439791b15aaa9c8778f488f3eb6f4275d9687e576a7363cbc24d065332e96c7dde9cdbdcc972fe1bd3c17aaee2bb39ec35293a0dce057704f0efc56434915e7a8b191c2670d402f9b2c84302ea7e90f1337c9e12c029320dde679261e2e529ceb371cc73100f78cacf43e1723a2b6962dffaf9e32f52c438937e5b3ced389c8d41018712dc730593e677ab2d20ff964a408589bd19ce86d8c1653436cd1830d56f53266559fc4ee04068b409a7b605571ae2af355bd83716f3e9c2630e1018f8e8e5ab8238846c13725b436527ca0806e9abf0620ebedf036db66dad06e02c671b789410500fb12fa82d5b72fc4616f0e20575c15ec5ab981b05a59c091dca2745b6cfb11a63b3fedbd26eb867cab6928b1508d4854534abf9e45cef9a0968d71245b44368577999e0b7d5e626f759e1bdd815e25d13395f5d5b848df5e81862", 0x1000}) [ 1049.926138] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1049.959146] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1049.967830] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:45:08 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000600"}, &(0x7f0000000080)=0x1e) [ 1050.018877] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1050.046322] attempt to access beyond end of device [ 1050.048988] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1050.066383] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1050.078280] loop5: rw=12288, want=8200, limit=20 [ 1050.087173] gfs2: not a GFS2 filesystem [ 1050.122512] attempt to access beyond end of device [ 1050.127514] loop5: rw=12288, want=12296, limit=20 [ 1050.172292] attempt to access beyond end of device 03:45:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010005000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1050.210590] loop5: rw=12288, want=8200, limit=20 03:45:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff0000007a0000c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1050.248963] attempt to access beyond end of device [ 1050.284724] loop5: rw=12288, want=12296, limit=20 [ 1050.436442] EXT4-fs (loop4): Test dummy encryption mode enabled 03:45:09 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c000a000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:09 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000300"}, &(0x7f0000000080)=0x1e) 03:45:09 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:09 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000500"}, &(0x7f0000000080)=0x1e) 03:45:09 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000620008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x10000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1050.479659] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1050.489454] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:45:09 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c00dd210900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1050.530051] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1050.568130] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1050.593842] gfs2: not a GFS2 filesystem [ 1050.602236] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1050.631279] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:45:09 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000600"}, &(0x7f0000000080)=0x1e) [ 1050.639482] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1050.672938] attempt to access beyond end of device 03:45:09 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1050.706354] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1050.717050] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1050.718353] gfs2: not a GFS2 filesystem [ 1050.735106] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1050.751955] loop5: rw=12288, want=8200, limit=20 [ 1050.774886] attempt to access beyond end of device [ 1050.793959] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1050.803182] loop5: rw=12288, want=12296, limit=20 [ 1050.811745] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1050.817062] f2fs_msg: 28 callbacks suppressed [ 1050.817073] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 1050.848928] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1050.902886] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1050.923106] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1050.943935] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:45:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x6000000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:09 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000400"}, &(0x7f0000000080)=0x1e) 03:45:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000600000c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1050.954978] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1050.979179] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1050.989851] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:09 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1051.049380] attempt to access beyond end of device [ 1051.090747] loop5: rw=12288, want=8200, limit=20 03:45:09 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000004010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1051.123127] attempt to access beyond end of device 03:45:09 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e24, 0x9, @empty, 0xf6}, @in6={0xa, 0x4e21, 0x9, @mcast2, 0x5}, @in={0x2, 0x4e21, @remote}, @in={0x2, 0x4e23, @multicast1}, @in={0x2, 0x4e24, @local}, @in6={0xa, 0x4e21, 0x8, @remote, 0x80000000}], 0x84) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x10, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) 03:45:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000c000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1051.150563] loop5: rw=12288, want=12296, limit=20 [ 1051.160466] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 1051.276532] gfs2: not a GFS2 filesystem [ 1051.319125] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1051.345693] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1051.362907] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1051.390349] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1051.404859] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1051.409116] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1051.434740] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1051.446630] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1051.453737] attempt to access beyond end of device [ 1051.456475] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1051.460941] loop5: rw=12288, want=8200, limit=20 [ 1051.473398] attempt to access beyond end of device [ 1051.478467] loop5: rw=12288, want=12296, limit=20 [ 1051.483549] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 1051.486750] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1051.491775] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1051.508011] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1051.515917] attempt to access beyond end of device [ 1051.521051] loop5: rw=12288, want=8200, limit=20 [ 1051.525619] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1051.525991] attempt to access beyond end of device [ 1051.539715] loop5: rw=12288, want=12296, limit=20 03:45:10 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0072020900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:10 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000300"}, &(0x7f0000000080)=0x1e) 03:45:10 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x0, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x4800, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}]}) 03:45:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x8000000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1051.545313] F2FS-fs (loop5): Failed to get valid F2FS checkpoint 03:45:10 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000600"}, &(0x7f0000000080)=0x1e) 03:45:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000740000c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1051.719522] gfs2: not a GFS2 filesystem [ 1051.725619] EXT4-fs (loop4): Test dummy encryption mode enabled 03:45:10 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000500"}, &(0x7f0000000080)=0x1e) 03:45:10 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x0, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1051.763209] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1051.775366] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1051.825455] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1051.879137] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1051.879433] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1051.904545] attempt to access beyond end of device [ 1051.929818] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1051.944624] loop5: rw=12288, want=8200, limit=20 [ 1051.946698] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:45:10 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000300"}, &(0x7f0000000080)=0x1e) 03:45:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xfcfdffff00000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1051.975637] attempt to access beyond end of device 03:45:10 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000006000008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1052.039695] loop5: rw=12288, want=12296, limit=20 [ 1052.043080] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1052.070583] attempt to access beyond end of device [ 1052.082983] loop5: rw=12288, want=8200, limit=20 03:45:10 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000500"}, &(0x7f0000000080)=0x1e) [ 1052.091285] attempt to access beyond end of device 03:45:10 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) 03:45:10 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x0, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1052.136371] loop5: rw=12288, want=12296, limit=20 03:45:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001002d000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1052.186059] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1052.213144] gfs2: not a GFS2 filesystem [ 1052.244278] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1052.262887] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1052.288732] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1052.320865] attempt to access beyond end of device [ 1052.322088] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1052.343387] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1052.364697] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1052.371726] loop5: rw=12288, want=8200, limit=20 [ 1052.413277] attempt to access beyond end of device [ 1052.415219] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1052.437211] loop5: rw=12288, want=12296, limit=20 [ 1052.452952] attempt to access beyond end of device [ 1052.458008] loop5: rw=12288, want=8200, limit=20 [ 1052.472444] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1052.527773] attempt to access beyond end of device [ 1052.541694] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1052.559375] loop5: rw=12288, want=12296, limit=20 [ 1052.568579] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:45:11 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000060900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:11 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000500"}, &(0x7f0000000080)=0x1e) 03:45:11 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000ffffffff00"}, &(0x7f0000000080)=0x1e) 03:45:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x1000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:11 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6}}}}, 0xf8}}, 0x0) 03:45:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000006c00c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1052.592379] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1052.616034] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1052.622924] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1052.631046] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010308000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1052.703948] gfs2: not a GFS2 filesystem 03:45:11 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000100"}, &(0x7f0000000080)=0x1e) 03:45:11 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000200008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1052.752776] EXT4-fs (loop1): Test dummy encryption mode enabled 03:45:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000fff0000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1052.851152] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:45:11 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6}}}}, 0xf8}}, 0x0) [ 1052.900982] attempt to access beyond end of device 03:45:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x20000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1052.938677] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1052.972279] loop5: rw=12288, want=8200, limit=20 [ 1052.983327] EXT4-fs (loop4): Test dummy encryption mode enabled 03:45:11 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) [ 1053.021220] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1053.032285] attempt to access beyond end of device 03:45:11 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000500"}, &(0x7f0000000080)=0x1e) [ 1053.065506] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1053.076796] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1053.095741] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1053.110018] loop5: rw=12288, want=12296, limit=20 [ 1053.137338] attempt to access beyond end of device [ 1053.139288] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1053.148291] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1053.160234] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1053.188495] loop5: rw=12288, want=8200, limit=20 [ 1053.210753] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1053.218188] attempt to access beyond end of device [ 1053.241999] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1053.255286] loop5: rw=12288, want=12296, limit=20 [ 1053.269922] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1053.287094] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:45:11 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6}}}}, 0xf8}}, 0x0) 03:45:12 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000500"}, &(0x7f0000000080)=0x1e) [ 1053.315387] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1053.324736] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1053.352846] gfs2: not a GFS2 filesystem [ 1053.366419] attempt to access beyond end of device [ 1053.378408] loop5: rw=12288, want=8200, limit=20 [ 1053.383524] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1053.438889] attempt to access beyond end of device [ 1053.457666] loop5: rw=12288, want=12296, limit=20 [ 1053.495831] attempt to access beyond end of device [ 1053.517573] loop5: rw=12288, want=8200, limit=20 [ 1053.529636] attempt to access beyond end of device [ 1053.543168] loop5: rw=12288, want=12296, limit=20 [ 1053.588056] gfs2: not a GFS2 filesystem 03:45:12 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c00000c0900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:12 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000500"}, &(0x7f0000000080)=0x1e) 03:45:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000001f00c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:12 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec0000000f0008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:12 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000500"}, &(0x7f0000000080)=0x1e) 03:45:12 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000500"}, &(0x7f0000000080)=0x1e) 03:45:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010010000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:12 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x4800, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x300, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1053.749125] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1053.769367] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1053.784341] EXT4-fs (loop7): Test dummy encryption mode enabled 03:45:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xf801000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1053.821149] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1053.827683] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1053.836773] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1053.880851] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1053.905704] attempt to access beyond end of device [ 1053.910375] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:12 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000100"}, &(0x7f0000000080)=0x1e) [ 1053.931839] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1053.950392] loop5: rw=12288, want=8200, limit=20 [ 1053.958888] attempt to access beyond end of device [ 1053.982030] attempt to access beyond end of device [ 1053.993513] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1054.000414] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1054.008065] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1054.021138] loop5: rw=12288, want=12296, limit=20 [ 1054.045407] attempt to access beyond end of device [ 1054.057038] loop2: rw=4096, want=136, limit=36 [ 1054.083217] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1054.089928] attempt to access beyond end of device [ 1054.090226] gfs2: error 10 reading superblock [ 1054.099050] loop5: rw=12288, want=8200, limit=20 [ 1054.132391] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:45:12 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipv0\x00'}, &(0x7f0000000080)=0x1e) [ 1054.141826] loop3: rw=4096, want=136, limit=1 [ 1054.154914] attempt to access beyond end of device [ 1054.160019] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1054.181144] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1054.182119] gfs2: error 10 reading superblock 03:45:12 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000600"}, &(0x7f0000000080)=0x1e) 03:45:12 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000060010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000009c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000050000c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1054.212821] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1054.229336] loop5: rw=12288, want=12296, limit=20 [ 1054.240993] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1054.359215] attempt to access beyond end of device [ 1054.401063] attempt to access beyond end of device [ 1054.404462] loop3: rw=4096, want=136, limit=1 [ 1054.406118] loop5: rw=12288, want=8200, limit=20 [ 1054.427317] gfs2: error 10 reading superblock [ 1054.444282] attempt to access beyond end of device [ 1054.449388] loop5: rw=12288, want=12296, limit=20 [ 1054.455470] attempt to access beyond end of device [ 1054.461389] loop5: rw=12288, want=8200, limit=20 [ 1054.470218] attempt to access beyond end of device [ 1054.475489] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1054.482168] loop5: rw=12288, want=12296, limit=20 [ 1054.499006] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1054.516600] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1054.549973] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1054.550104] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:45:13 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0074000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:13 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) 03:45:13 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000600"}, &(0x7f0000000080)=0x1e) 03:45:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010002000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xe0000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:13 executing program 0 (fault-call:1 fault-nth:0): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1054.600114] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:13 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000300"}, &(0x7f0000000080)=0x1e) [ 1054.740031] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1054.746162] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1054.760512] gfs2: not a GFS2 filesystem 03:45:13 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000600"}, &(0x7f0000000080)=0x1e) 03:45:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff0000000a0000c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1054.802946] FAULT_INJECTION: forcing a failure. [ 1054.802946] name failslab, interval 1, probability 0, space 0, times 0 [ 1054.828658] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1054.888031] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1054.901283] CPU: 0 PID: 20049 Comm: syz-executor0 Not tainted 4.19.0-rc2+ #5 [ 1054.908509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1054.918006] Call Trace: [ 1054.920624] dump_stack+0x1c4/0x2b4 [ 1054.924317] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1054.929633] should_fail.cold.4+0xa/0x17 [ 1054.933817] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1054.938952] ? zap_class+0x640/0x640 [ 1054.942693] ? graph_lock+0x170/0x170 [ 1054.946522] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1054.952089] ? graph_lock+0x170/0x170 [ 1054.955914] ? find_held_lock+0x36/0x1c0 [ 1054.960012] ? ___might_sleep+0x1ed/0x300 [ 1054.964174] ? __local_bh_enable_ip+0x160/0x260 [ 1054.968861] ? arch_local_save_flags+0x40/0x40 [ 1054.973464] ? trace_hardirqs_on+0xbd/0x310 [ 1054.977804] ? _raw_spin_unlock_bh+0x30/0x40 [ 1054.982236] __should_failslab+0x124/0x180 [ 1054.986522] should_failslab+0x9/0x14 [ 1054.990339] kmem_cache_alloc_node+0x26e/0x730 [ 1054.994937] ? __local_bh_enable_ip+0x160/0x260 [ 1054.999625] ? _raw_spin_unlock_bh+0x30/0x40 [ 1055.004054] __alloc_skb+0x119/0x770 [ 1055.007791] ? skb_scrub_packet+0x490/0x490 [ 1055.012134] ? netlink_insert+0x15a/0x3f0 [ 1055.016318] ? __netlink_insert+0x13b0/0x13b0 [ 1055.020844] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1055.026402] ? netlink_autobind.isra.34+0x232/0x310 [ 1055.031441] netlink_sendmsg+0xb29/0xfc0 [ 1055.035532] ? netlink_unicast+0x760/0x760 [ 1055.039790] ? smack_socket_sendmsg+0xb0/0x190 [ 1055.044521] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1055.050072] ? security_socket_sendmsg+0x94/0xc0 [ 1055.054843] ? netlink_unicast+0x760/0x760 [ 1055.059093] sock_sendmsg+0xd5/0x120 [ 1055.062825] ___sys_sendmsg+0x7fd/0x930 [ 1055.066814] ? find_held_lock+0x36/0x1c0 [ 1055.070897] ? copy_msghdr_from_user+0x580/0x580 [ 1055.075670] ? lock_downgrade+0x900/0x900 [ 1055.079837] ? proc_fail_nth_write+0x9e/0x210 [ 1055.084357] ? __fget_light+0x2e9/0x430 [ 1055.088347] ? fget_raw+0x20/0x20 [ 1055.091827] ? kasan_check_write+0x14/0x20 [ 1055.096080] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1055.101031] ? wait_for_completion+0x8a0/0x8a0 [ 1055.105643] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1055.111196] ? sockfd_lookup_light+0xc5/0x160 [ 1055.115712] __sys_sendmsg+0x11d/0x280 [ 1055.119619] ? __ia32_sys_shutdown+0x80/0x80 [ 1055.124041] ? __sb_end_write+0xd9/0x110 [ 1055.128123] ? fput+0x130/0x1a0 [ 1055.131421] ? do_syscall_64+0x9a/0x820 [ 1055.135410] ? do_syscall_64+0x9a/0x820 [ 1055.139414] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1055.144880] ? ksys_ioctl+0x81/0xd0 [ 1055.148528] __x64_sys_sendmsg+0x78/0xb0 [ 1055.152608] do_syscall_64+0x1b9/0x820 [ 1055.156514] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1055.161896] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1055.166844] ? trace_hardirqs_on_caller+0x310/0x310 [ 1055.171880] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1055.176912] ? recalc_sigpending_tsk+0x180/0x180 [ 1055.181687] ? kasan_check_write+0x14/0x20 [ 1055.185948] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1055.190814] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1055.196017] RIP: 0033:0x457099 [ 1055.199225] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1055.218163] RSP: 002b:00007fb349b4bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1055.225891] RAX: ffffffffffffffda RBX: 00007fb349b4c6d4 RCX: 0000000000457099 03:45:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x40000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1055.233172] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003 [ 1055.240455] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 1055.247734] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1055.255015] R13: 00000000004d4c20 R14: 00000000004c915b R15: 0000000000000000 [ 1055.268552] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1055.274384] attempt to access beyond end of device 03:45:14 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000300"}, &(0x7f0000000080)=0x1e) 03:45:14 executing program 2 (fault-call:4 fault-nth:0): r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1055.312756] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1055.338129] loop5: rw=12288, want=8200, limit=20 03:45:14 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000014010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1055.386941] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1055.396551] attempt to access beyond end of device [ 1055.412046] gfs2: not a GFS2 filesystem [ 1055.453066] loop5: rw=12288, want=12296, limit=20 [ 1055.455666] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:45:14 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) [ 1055.494120] attempt to access beyond end of device [ 1055.516709] loop5: rw=12288, want=8200, limit=20 [ 1055.524957] attempt to access beyond end of device [ 1055.530210] loop5: rw=12288, want=12296, limit=20 03:45:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000e000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1055.612243] attempt to access beyond end of device [ 1055.622937] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1055.635438] FAULT_INJECTION: forcing a failure. [ 1055.635438] name failslab, interval 1, probability 0, space 0, times 0 [ 1055.669894] loop5: rw=12288, want=8200, limit=20 [ 1055.672671] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1055.680489] attempt to access beyond end of device 03:45:14 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000400"}, &(0x7f0000000080)=0x1e) [ 1055.716231] loop5: rw=12288, want=12296, limit=20 [ 1055.731128] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1055.744964] attempt to access beyond end of device [ 1055.748813] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1055.758706] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1055.783117] loop5: rw=12288, want=8200, limit=20 [ 1055.795400] CPU: 1 PID: 20123 Comm: syz-executor2 Not tainted 4.19.0-rc2+ #5 [ 1055.802621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1055.808833] attempt to access beyond end of device [ 1055.812117] Call Trace: [ 1055.812164] dump_stack+0x1c4/0x2b4 [ 1055.812183] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1055.812214] should_fail.cold.4+0xa/0x17 [ 1055.812239] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1055.818730] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1055.819795] ? perf_trace_lock+0x14d/0x7a0 [ 1055.819812] ? mutex_trylock+0x2b0/0x2b0 [ 1055.819827] ? debug_smp_processor_id+0x1c/0x20 [ 1055.819842] ? perf_trace_lock+0x14d/0x7a0 [ 1055.819859] ? graph_lock+0x170/0x170 [ 1055.819871] ? zap_class+0x640/0x640 [ 1055.819890] ? graph_lock+0x170/0x170 [ 1055.819916] ? find_held_lock+0x36/0x1c0 [ 1055.841451] loop5: rw=12288, want=12296, limit=20 [ 1055.846731] ? __lock_is_held+0xb5/0x140 [ 1055.846772] ? ___might_sleep+0x1ed/0x300 [ 1055.846790] ? arch_local_save_flags+0x40/0x40 [ 1055.846813] ? __local_bh_enable_ip+0x160/0x260 [ 1055.901812] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1055.906430] __should_failslab+0x124/0x180 [ 1055.910699] should_failslab+0x9/0x14 [ 1055.914527] __kmalloc_track_caller+0x2d0/0x750 [ 1055.919230] ? lock_sock_nested+0x9a/0x120 [ 1055.923523] ? lock_sock_nested+0x9a/0x120 [ 1055.927793] ? do_ipv6_setsockopt.isra.9+0x754/0x45d0 [ 1055.933010] memdup_user+0x2c/0xa0 [ 1055.936580] do_ipv6_setsockopt.isra.9+0x754/0x45d0 [ 1055.941613] ? check_preemption_disabled+0x48/0x200 [ 1055.946659] ? ipv6_update_options+0x3b0/0x3b0 [ 1055.951282] ? graph_lock+0x170/0x170 [ 1055.955113] ? zap_class+0x640/0x640 [ 1055.958858] ? find_held_lock+0x36/0x1c0 [ 1055.962948] ? __fget+0x4aa/0x740 [ 1055.965366] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1055.966419] ? lock_downgrade+0x900/0x900 [ 1055.966434] ? check_preemption_disabled+0x48/0x200 [ 1055.966458] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1055.966475] ? kasan_check_read+0x11/0x20 [ 1055.966492] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1055.966509] ? rcu_bh_qs+0xc0/0xc0 [ 1055.966539] ? __fget+0x4d1/0x740 [ 1056.006768] ? ksys_dup3+0x680/0x680 [ 1056.010514] ? __f_unlock_pos+0x19/0x20 [ 1056.014513] ? lock_downgrade+0x900/0x900 [ 1056.018690] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1056.024300] ? __fget_light+0x2e9/0x430 [ 1056.028322] ? fget_raw+0x20/0x20 [ 1056.031809] ? wait_for_completion+0x8a0/0x8a0 [ 1056.036932] ipv6_setsockopt+0xbd/0x170 [ 1056.040930] ? ipv6_setsockopt+0xbd/0x170 [ 1056.045107] udpv6_setsockopt+0x62/0xa0 [ 1056.049101] sock_common_setsockopt+0x9a/0xe0 [ 1056.053616] __sys_setsockopt+0x1ba/0x3c0 [ 1056.057794] ? kernel_accept+0x310/0x310 [ 1056.061881] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1056.066486] ? trace_hardirqs_on+0xbd/0x310 [ 1056.070819] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1056.076205] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1056.081682] __x64_sys_setsockopt+0xbe/0x150 [ 1056.086117] do_syscall_64+0x1b9/0x820 [ 1056.090027] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1056.095417] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1056.100372] ? trace_hardirqs_on_caller+0x310/0x310 [ 1056.105415] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1056.110445] ? recalc_sigpending_tsk+0x180/0x180 [ 1056.115299] ? kasan_check_write+0x14/0x20 [ 1056.119561] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1056.124421] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1056.129615] RIP: 0033:0x457099 [ 1056.132830] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1056.151753] RSP: 002b:00007f3262229c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1056.159492] RAX: ffffffffffffffda RBX: 00007f326222a6d4 RCX: 0000000000457099 [ 1056.166866] RDX: 0000000000000030 RSI: 0000000000000029 RDI: 0000000000000003 [ 1056.174152] RBP: 00000000009300a0 R08: 0000000000000090 R09: 0000000000000000 [ 1056.181426] R10: 0000000020001800 R11: 0000000000000246 R12: 0000000000000004 [ 1056.188694] R13: 00000000004d5508 R14: 00000000004c03f8 R15: 0000000000000000 03:45:14 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0003000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xf5ffffff, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:14 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:14 executing program 2 (fault-call:4 fault-nth:1): r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:14 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000500"}, &(0x7f0000000080)=0x1e) [ 1056.331067] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1056.337573] gfs2: not a GFS2 filesystem [ 1056.369071] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:45:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000a00c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:15 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1056.400135] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:15 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x2}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:15 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000021010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:15 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) 03:45:15 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x11, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1056.492777] f2fs_msg: 48 callbacks suppressed [ 1056.492789] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:45:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x10, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010006000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1056.567721] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1056.631125] attempt to access beyond end of device [ 1056.638649] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1056.659885] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1056.667589] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:15 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000500"}, &(0x7f0000000080)=0x1e) [ 1056.738873] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1056.739803] loop5: rw=12288, want=8200, limit=20 [ 1056.751889] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1056.776187] EXT4-fs (loop4): Test dummy encryption mode enabled 03:45:15 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0xa}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1056.787092] gfs2: not a GFS2 filesystem [ 1056.800468] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:15 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x88, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1056.832279] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1056.858362] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1056.860422] attempt to access beyond end of device [ 1056.898682] loop5: rw=12288, want=12296, limit=20 [ 1056.901192] gfs2: not a GFS2 filesystem [ 1056.908093] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1056.919455] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 1056.929998] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1056.966142] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1056.975239] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1056.984712] attempt to access beyond end of device [ 1056.990168] loop5: rw=12288, want=8200, limit=20 [ 1057.000468] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1057.010071] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1057.019359] attempt to access beyond end of device [ 1057.026483] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1057.035104] loop5: rw=12288, want=12296, limit=20 [ 1057.057576] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 1057.065239] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1057.204917] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1057.229076] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1057.241298] attempt to access beyond end of device [ 1057.246321] loop5: rw=12288, want=8200, limit=20 [ 1057.251244] attempt to access beyond end of device [ 1057.256219] loop5: rw=12288, want=12296, limit=20 [ 1057.261787] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 1057.268174] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1057.275480] attempt to access beyond end of device [ 1057.280650] loop5: rw=12288, want=8200, limit=20 [ 1057.285518] attempt to access beyond end of device [ 1057.290527] loop5: rw=12288, want=12296, limit=20 03:45:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x2000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:16 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000ffffffff00"}, &(0x7f0000000080)=0x1e) 03:45:16 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x4, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:16 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0010000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000004800c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010011000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:16 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x20000050}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:16 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000003ab0008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:16 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x3, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1057.487528] attempt to access beyond end of device [ 1057.505549] EXT4-fs (loop4): Test dummy encryption mode enabled 03:45:16 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000500"}, &(0x7f0000000080)=0x1e) [ 1057.530110] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1057.546304] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1057.575186] loop3: rw=4096, want=136, limit=16 [ 1057.577506] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1057.607965] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1057.617244] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1057.634793] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1057.654327] gfs2: error 10 reading superblock [ 1057.670463] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:16 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x6, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:16 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0xd4170000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1057.681973] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1057.717969] attempt to access beyond end of device [ 1057.725742] loop5: rw=12288, want=8200, limit=20 [ 1057.739696] attempt to access beyond end of device [ 1057.741137] attempt to access beyond end of device [ 1057.783984] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1057.795368] loop5: rw=12288, want=12296, limit=20 [ 1057.815426] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1057.823324] loop3: rw=4096, want=136, limit=16 03:45:16 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x4d, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1057.828141] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1057.836051] gfs2: error 10 reading superblock [ 1057.850743] attempt to access beyond end of device 03:45:16 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000400008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1057.876676] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1057.909401] loop5: rw=12288, want=8200, limit=20 03:45:16 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000600"}, &(0x7f0000000080)=0x1e) [ 1057.933108] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x68, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:16 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x3f000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:16 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x4e, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1057.974954] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1057.984589] attempt to access beyond end of device [ 1058.010792] loop5: rw=12288, want=12296, limit=20 03:45:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000003f00c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1058.155592] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1058.176062] attempt to access beyond end of device [ 1058.193044] gfs2: not a GFS2 filesystem [ 1058.198390] loop5: rw=12288, want=8200, limit=20 [ 1058.204017] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1058.218855] attempt to access beyond end of device [ 1058.231912] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1058.241804] loop5: rw=12288, want=12296, limit=20 [ 1058.247911] attempt to access beyond end of device [ 1058.252720] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1058.276954] loop5: rw=12288, want=8200, limit=20 [ 1058.292198] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1058.313533] attempt to access beyond end of device [ 1058.322992] gfs2: not a GFS2 filesystem [ 1058.327183] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1058.345778] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1058.359224] loop5: rw=12288, want=12296, limit=20 [ 1058.396064] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1058.407399] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:17 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000070900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010004000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:17 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:17 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000300"}, &(0x7f0000000080)=0x1e) 03:45:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x37, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x74, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x35, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:17 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000400"}, &(0x7f0000000080)=0x1e) [ 1058.612905] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1058.627348] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1058.635890] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1058.655560] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:45:17 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000140008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1058.665765] gfs2: not a GFS2 filesystem 03:45:17 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0xf0ffffff00000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1058.715800] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1058.730645] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1058.731383] attempt to access beyond end of device [ 1058.767434] gfs2: not a GFS2 filesystem 03:45:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x36, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1058.863793] loop5: rw=12288, want=8200, limit=20 [ 1058.887484] attempt to access beyond end of device 03:45:17 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000500"}, &(0x7f0000000080)=0x1e) 03:45:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x4000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1058.926219] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1058.927941] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1058.951860] loop5: rw=12288, want=12296, limit=20 [ 1058.965985] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:45:17 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0xa00000000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000002d00c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1058.967150] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1058.985839] attempt to access beyond end of device [ 1059.013195] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x38, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1059.058303] loop5: rw=12288, want=8200, limit=20 [ 1059.113435] attempt to access beyond end of device [ 1059.139321] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1059.152737] gfs2: not a GFS2 filesystem [ 1059.156270] loop5: rw=12288, want=12296, limit=20 [ 1059.193489] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1059.225756] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1059.238816] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1059.278292] EXT4-fs (loop7): Test dummy encryption mode enabled 03:45:18 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000680900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000a000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x4a, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:18 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) 03:45:18 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0xfffff000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x2300000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1059.350512] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1059.378004] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1059.388698] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1059.431508] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1059.442201] EXT4-fs (loop4): Test dummy encryption mode enabled 03:45:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x11, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:18 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000100"}, &(0x7f0000000080)=0x1e) [ 1059.482210] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:45:18 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000009010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:18 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x2000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1059.532998] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1059.569351] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x15, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:18 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) [ 1059.657835] gfs2: not a GFS2 filesystem [ 1059.659017] attempt to access beyond end of device [ 1059.670542] loop5: rw=12288, want=8200, limit=20 [ 1059.716139] attempt to access beyond end of device [ 1059.743520] loop5: rw=12288, want=12296, limit=20 03:45:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000004000c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1059.768424] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1059.787178] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1059.797015] attempt to access beyond end of device [ 1059.856360] loop5: rw=12288, want=8200, limit=20 03:45:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x48000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:18 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0xf0}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1059.878414] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1059.893939] attempt to access beyond end of device [ 1059.899063] loop5: rw=12288, want=12296, limit=20 03:45:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010014000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1060.186333] gfs2: not a GFS2 filesystem [ 1060.200661] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1060.221106] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1060.227422] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:45:18 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000090900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:18 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000200"}, &(0x7f0000000080)=0x1e) 03:45:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x42, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:18 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x2}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1060.265024] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1060.291428] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:19 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x5, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1060.315344] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1060.332120] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1060.363523] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1060.399183] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1060.430073] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1060.457074] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1060.479690] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1060.495371] attempt to access beyond end of device [ 1060.514463] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:19 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x1a, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x40000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:19 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000300"}, &(0x7f0000000080)=0x1e) [ 1060.562321] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1060.589914] loop5: rw=12288, want=8200, limit=20 [ 1060.638095] attempt to access beyond end of device [ 1060.659512] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1060.669247] loop5: rw=12288, want=12296, limit=20 [ 1060.724385] attempt to access beyond end of device [ 1060.790569] loop5: rw=12288, want=8200, limit=20 03:45:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000041000c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:19 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x17d4}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:19 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x17, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010043000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:19 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec0000000f0008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:19 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) [ 1060.813075] gfs2: not a GFS2 filesystem [ 1060.820676] attempt to access beyond end of device [ 1060.835537] loop5: rw=12288, want=12296, limit=20 [ 1060.923350] gfs2: not a GFS2 filesystem 03:45:19 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x2a, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:19 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000400"}, &(0x7f0000000080)=0x1e) [ 1060.949013] attempt to access beyond end of device [ 1060.957992] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1060.967462] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1060.970845] loop5: rw=12288, want=8200, limit=20 [ 1060.981885] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1061.020300] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1061.029186] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1061.046838] attempt to access beyond end of device [ 1061.063382] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1061.090116] loop5: rw=12288, want=12296, limit=20 [ 1061.114681] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1061.150556] attempt to access beyond end of device [ 1061.167224] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1061.173174] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1061.198406] loop5: rw=12288, want=8200, limit=20 [ 1061.219901] attempt to access beyond end of device [ 1061.227329] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1061.246300] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1061.265241] loop5: rw=12288, want=12296, limit=20 [ 1061.280856] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1061.280992] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1061.287349] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:45:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xffffffff00000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:20 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0xa}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:20 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c00006c0900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:20 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x48, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1061.338596] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:20 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000200"}, &(0x7f0000000080)=0x1e) 03:45:20 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x3c, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010003000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1061.440534] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1061.480491] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:45:20 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0xffffff7f00000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000007a00c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1061.488204] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1061.515243] gfs2: not a GFS2 filesystem 03:45:20 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000600"}, &(0x7f0000000080)=0x1e) [ 1061.598809] EXT4-fs (loop1): Test dummy encryption mode enabled 03:45:20 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x2d, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1061.647317] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1061.662341] f2fs_msg: 38 callbacks suppressed [ 1061.662355] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1061.697779] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1061.709245] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:45:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x1f00000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:20 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000080008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:20 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0xf0ffffffffffff}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1061.789123] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:20 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) [ 1061.894949] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1061.930089] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1061.939676] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1061.964021] gfs2: not a GFS2 filesystem [ 1061.974525] EXT4-fs (loop7): Test dummy encryption mode enabled 03:45:20 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x23, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1061.999377] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1062.009721] attempt to access beyond end of device [ 1062.049927] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1062.069687] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1062.070642] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1062.091522] loop5: rw=12288, want=8200, limit=20 03:45:20 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0xf0ffff}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1062.096634] attempt to access beyond end of device 03:45:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x8cffffff00000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1062.122760] loop5: rw=12288, want=12296, limit=20 [ 1062.128013] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1062.142727] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 1062.152853] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1062.162958] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1062.175114] attempt to access beyond end of device [ 1062.186512] loop5: rw=12288, want=8200, limit=20 [ 1062.207686] attempt to access beyond end of device [ 1062.234405] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1062.266718] loop5: rw=12288, want=12296, limit=20 [ 1062.293619] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 1062.314957] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1062.391079] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1062.398388] gfs2: not a GFS2 filesystem [ 1062.409967] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1062.433593] attempt to access beyond end of device [ 1062.449348] loop5: rw=12288, want=8200, limit=20 [ 1062.457048] attempt to access beyond end of device [ 1062.463722] loop5: rw=12288, want=12296, limit=20 [ 1062.468890] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 1062.479179] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1062.490152] attempt to access beyond end of device [ 1062.503350] gfs2: not a GFS2 filesystem [ 1062.511110] loop5: rw=12288, want=8200, limit=20 [ 1062.515974] attempt to access beyond end of device [ 1062.561925] loop5: rw=12288, want=12296, limit=20 03:45:21 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c00003f0900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:21 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) 03:45:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010009000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:21 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x2, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:21 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000100008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000e00000c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:21 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0xf000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xffffff8c, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1062.693464] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1062.700091] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1062.730218] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:21 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000200"}, &(0x7f0000000080)=0x1e) 03:45:21 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x2b, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1062.730759] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1062.754815] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1062.768640] gfs2: not a GFS2 filesystem [ 1062.816103] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1062.832740] gfs2: not a GFS2 filesystem 03:45:21 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x3}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1062.861061] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1062.871330] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1062.879167] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1062.888493] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1062.909001] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1062.917057] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1062.945910] attempt to access beyond end of device [ 1063.021007] loop5: rw=12288, want=8200, limit=20 03:45:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xffffff97, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:21 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0xb, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000060000c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:21 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000020008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1063.051105] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1063.061821] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1063.069342] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1063.090082] attempt to access beyond end of device [ 1063.118762] loop5: rw=12288, want=12296, limit=20 03:45:21 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000600"}, &(0x7f0000000080)=0x1e) [ 1063.152097] attempt to access beyond end of device [ 1063.164724] loop5: rw=12288, want=8200, limit=20 [ 1063.314375] attempt to access beyond end of device [ 1063.321384] gfs2: not a GFS2 filesystem [ 1063.340897] loop5: rw=12288, want=12296, limit=20 [ 1063.352500] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1063.368173] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1063.375915] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1063.375931] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1063.375947] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1063.401563] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1063.423006] gfs2: not a GFS2 filesystem [ 1063.445420] attempt to access beyond end of device [ 1063.461581] loop5: rw=12288, want=8200, limit=20 [ 1063.469069] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1063.485522] attempt to access beyond end of device [ 1063.490037] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1063.517565] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1063.524752] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1063.537767] loop5: rw=12288, want=12296, limit=20 [ 1063.543368] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1063.547364] attempt to access beyond end of device [ 1063.554389] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1063.569542] loop5: rw=12288, want=8200, limit=20 [ 1063.576243] attempt to access beyond end of device [ 1063.593105] loop5: rw=12288, want=12296, limit=20 03:45:22 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0068000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:22 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0xfffffffffffff000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010007000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:22 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x32, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:22 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) 03:45:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xfffffff5, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:22 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec0000009b0308000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000100400c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:22 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x1c, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:22 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x3f00000000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1063.810080] gfs2: not a GFS2 filesystem 03:45:22 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) [ 1063.867535] attempt to access beyond end of device [ 1063.873422] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1063.903511] gfs2: not a GFS2 filesystem [ 1063.908647] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1063.920167] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1063.930930] loop5: rw=12288, want=8200, limit=20 03:45:22 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x33, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1063.980783] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1063.983916] attempt to access beyond end of device [ 1063.993917] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1064.017026] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1064.019968] loop5: rw=12288, want=12296, limit=20 [ 1064.060074] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1064.070247] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1064.095674] attempt to access beyond end of device 03:45:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x10000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1064.117202] loop5: rw=12288, want=8200, limit=20 [ 1064.129127] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:22 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x16, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:22 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x400300}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1064.158656] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1064.158662] attempt to access beyond end of device [ 1064.158685] loop5: rw=12288, want=12296, limit=20 03:45:22 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) [ 1064.220627] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1064.274451] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1064.290114] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1064.345415] attempt to access beyond end of device [ 1064.360029] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1064.368995] loop5: rw=12288, want=8200, limit=20 [ 1064.374180] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1064.383041] attempt to access beyond end of device [ 1064.383058] loop5: rw=12288, want=12296, limit=20 03:45:23 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0014000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:23 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x21, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010094030000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000500c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:23 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x9effffff}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:23 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000ffffffff00"}, &(0x7f0000000080)=0x1e) 03:45:23 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000040008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:23 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x2e, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1064.383607] attempt to access beyond end of device [ 1064.467129] loop5: rw=12288, want=8200, limit=20 [ 1064.472721] attempt to access beyond end of device [ 1064.477956] loop5: rw=12288, want=12296, limit=20 [ 1064.484623] gfs2: not a GFS2 filesystem [ 1064.617444] EXT4-fs (loop4): Test dummy encryption mode enabled 03:45:23 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000300"}, &(0x7f0000000080)=0x1e) [ 1064.710423] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1064.715830] attempt to access beyond end of device [ 1064.720583] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1064.735934] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1064.738855] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1064.751921] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:23 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0xfffffff0}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1064.769974] loop5: rw=12288, want=8200, limit=20 [ 1064.775147] attempt to access beyond end of device [ 1064.801788] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1064.807101] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1064.836346] loop5: rw=12288, want=12296, limit=20 03:45:23 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xfffffdfd, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:23 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x4b, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1064.877555] attempt to access beyond end of device [ 1064.882927] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1064.931556] loop5: rw=12288, want=8200, limit=20 [ 1064.943394] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1064.969553] attempt to access beyond end of device [ 1064.980663] loop5: rw=12288, want=12296, limit=20 [ 1064.987051] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1065.007588] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1065.032490] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1065.041070] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1065.067802] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1065.087880] attempt to access beyond end of device 03:45:23 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x19, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:23 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) [ 1065.119443] gfs2: not a GFS2 filesystem [ 1065.127348] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1065.156329] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:23 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0xfcea2a6146}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1065.182953] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1065.192308] loop5: rw=12288, want=8200, limit=20 [ 1065.209181] attempt to access beyond end of device 03:45:23 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x18, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1065.261093] loop5: rw=12288, want=12296, limit=20 [ 1065.325215] attempt to access beyond end of device [ 1065.335095] loop5: rw=12288, want=8200, limit=20 [ 1065.345909] attempt to access beyond end of device [ 1065.352816] loop5: rw=12288, want=12296, limit=20 03:45:24 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c007a000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000d000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:24 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x700000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:24 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000000608000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000004c00c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:24 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000400"}, &(0x7f0000000080)=0x1e) 03:45:24 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0xf0ffffff}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x39, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1065.562994] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1065.572016] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1065.615944] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1065.617141] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1065.642577] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1065.649704] gfs2: not a GFS2 filesystem 03:45:24 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000600"}, &(0x7f0000000080)=0x1e) 03:45:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x4c, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1065.676695] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1065.709161] attempt to access beyond end of device 03:45:24 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0xf000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1065.720078] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1065.755967] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1065.765366] loop5: rw=12288, want=8200, limit=20 [ 1065.799954] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1065.817520] gfs2: not a GFS2 filesystem [ 1065.869991] attempt to access beyond end of device 03:45:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x12, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1065.904007] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1065.925028] loop5: rw=12288, want=12296, limit=20 [ 1065.941537] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1065.952939] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1065.990112] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1065.999425] attempt to access beyond end of device 03:45:24 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x3f00000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:24 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) 03:45:24 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0xa00}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001002f000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1066.004721] loop5: rw=12288, want=8200, limit=20 [ 1066.010205] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1066.019380] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1066.040829] attempt to access beyond end of device [ 1066.085146] loop5: rw=12288, want=12296, limit=20 [ 1066.221248] gfs2: not a GFS2 filesystem [ 1066.274779] attempt to access beyond end of device [ 1066.281047] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1066.301568] loop5: rw=12288, want=8200, limit=20 [ 1066.311431] gfs2: not a GFS2 filesystem [ 1066.331385] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1066.332593] attempt to access beyond end of device [ 1066.349954] loop5: rw=12288, want=12296, limit=20 [ 1066.355406] attempt to access beyond end of device [ 1066.401536] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1066.431537] loop5: rw=12288, want=8200, limit=20 [ 1066.436517] attempt to access beyond end of device [ 1066.452450] loop5: rw=12288, want=12296, limit=20 03:45:25 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000050900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:25 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x3b, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:25 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000003508000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:25 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) 03:45:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000001400c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:25 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0xf}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x6000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1066.501791] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1066.510803] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1066.518593] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:25 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x49, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec0000000100087fffffff0000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1066.625446] attempt to access beyond end of device [ 1066.633930] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1066.652903] EXT4-fs (loop7): Test dummy encryption mode enabled 03:45:25 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0xd417000000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:25 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000500"}, &(0x7f0000000080)=0x1e) [ 1066.687037] loop3: rw=4096, want=136, limit=48 [ 1066.700891] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1066.709949] gfs2: error 10 reading superblock [ 1066.716289] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1066.738079] f2fs_msg: 50 callbacks suppressed [ 1066.738114] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1066.768985] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1066.780530] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1066.802612] attempt to access beyond end of device [ 1066.829849] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1066.860709] attempt to access beyond end of device [ 1066.878585] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1066.879684] loop3: rw=4096, want=136, limit=48 [ 1066.900842] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1066.920102] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:45:25 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000300"}, &(0x7f0000000080)=0x1e) [ 1066.966024] loop5: rw=12288, want=8200, limit=20 [ 1066.976181] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1066.976202] gfs2: error 10 reading superblock [ 1066.982545] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1067.007961] attempt to access beyond end of device 03:45:25 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0xf00000000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:25 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x2f, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1067.013179] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (16777215 log_block_size) [ 1067.018122] loop5: rw=12288, want=12296, limit=20 [ 1067.033275] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1067.035923] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:45:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x500000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1067.073713] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1067.083209] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 1067.089685] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1067.102139] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1067.110846] attempt to access beyond end of device [ 1067.116594] loop5: rw=12288, want=8200, limit=20 03:45:25 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) [ 1067.181955] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1067.226719] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1067.234971] attempt to access beyond end of device [ 1067.250485] loop5: rw=12288, want=12296, limit=20 [ 1067.254807] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (16777215 log_block_size) [ 1067.311474] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 1067.313008] gfs2: not a GFS2 filesystem [ 1067.420478] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1067.454050] gfs2: not a GFS2 filesystem [ 1067.461006] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1067.490955] attempt to access beyond end of device [ 1067.500982] loop5: rw=12288, want=8200, limit=20 [ 1067.508447] attempt to access beyond end of device [ 1067.513729] loop5: rw=12288, want=12296, limit=20 [ 1067.518729] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 1067.556920] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1067.580508] attempt to access beyond end of device [ 1067.585661] loop5: rw=12288, want=8200, limit=20 [ 1067.593824] attempt to access beyond end of device [ 1067.598779] loop5: rw=12288, want=12296, limit=20 03:45:26 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c000fff0900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000e0ff00c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:26 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000030008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x10, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:26 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x3000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:26 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000300"}, &(0x7f0000000080)=0x1e) 03:45:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000070000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:26 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x6000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x1b, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1067.712439] gfs2: not a GFS2 filesystem 03:45:26 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x300}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:26 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000400"}, &(0x7f0000000080)=0x1e) 03:45:26 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x4c000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1067.752000] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1067.764958] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1067.773507] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1067.779596] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1067.794411] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1067.811229] gfs2: not a GFS2 filesystem [ 1067.817926] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1067.850736] EXT4-fs (loop4): Invalid log block size: 458752 [ 1067.861300] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1067.890847] attempt to access beyond end of device [ 1067.895809] loop5: rw=12288, want=8200, limit=20 [ 1067.920282] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1067.929250] attempt to access beyond end of device [ 1067.935249] loop5: rw=12288, want=12296, limit=20 [ 1067.947090] attempt to access beyond end of device [ 1067.952904] loop5: rw=12288, want=8200, limit=20 [ 1067.962895] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1067.984800] attempt to access beyond end of device [ 1067.999406] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:45:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x3e, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:26 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0xd417}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x8, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:26 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0xf00}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:27 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000600"}, &(0x7f0000000080)=0x1e) 03:45:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff0000007c0c00c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:27 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000140008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000700000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:27 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c00007a0900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:27 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x3a, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:27 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000500"}, &(0x7f0000000080)=0x1e) [ 1068.032284] loop5: rw=12288, want=12296, limit=20 [ 1068.042702] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1068.081458] EXT4-fs (loop4): Invalid log block size: 458752 [ 1068.102950] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1068.132220] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1068.164593] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1068.179992] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1068.216201] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1068.271160] gfs2: not a GFS2 filesystem 03:45:27 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x300000000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1068.581156] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1068.619288] EXT4-fs (loop4): Test dummy encryption mode enabled 03:45:27 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x31, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:27 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x5, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1068.636385] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1068.691940] attempt to access beyond end of device [ 1068.700589] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1068.709075] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1068.718960] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1068.733305] loop5: rw=12288, want=8200, limit=20 [ 1068.776032] attempt to access beyond end of device [ 1068.782058] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1068.800078] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1068.809082] EXT4-fs (loop4): Unsupported filesystem blocksize 131072 (7 log_block_size) 03:45:27 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x43, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:27 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000600"}, &(0x7f0000000080)=0x1e) [ 1068.838494] gfs2: not a GFS2 filesystem [ 1068.844169] loop5: rw=12288, want=12296, limit=20 03:45:27 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x100000000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1068.881535] attempt to access beyond end of device [ 1068.892815] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1068.903040] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1068.912595] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1068.921369] loop5: rw=12288, want=8200, limit=20 [ 1068.945200] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1068.966107] attempt to access beyond end of device [ 1068.988216] EXT4-fs (loop4): Unsupported filesystem blocksize 131072 (7 log_block_size) [ 1069.014061] gfs2: not a GFS2 filesystem [ 1069.024033] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1069.030578] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1069.033604] loop5: rw=12288, want=12296, limit=20 03:45:27 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x14, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:27 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x7a00000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1069.115958] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:45:27 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000200"}, &(0x7f0000000080)=0x1e) 03:45:27 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x9effffff00000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1069.157121] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff0000006c0000c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1069.340890] attempt to access beyond end of device 03:45:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008ffffffffffffffff00002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:28 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000430008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1069.365710] loop5: rw=12288, want=8200, limit=20 [ 1069.413417] attempt to access beyond end of device [ 1069.434212] gfs2: not a GFS2 filesystem [ 1069.469949] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1069.476213] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1069.476281] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1069.484443] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1069.501340] loop5: rw=12288, want=12296, limit=20 [ 1069.508073] attempt to access beyond end of device [ 1069.539592] loop5: rw=12288, want=8200, limit=20 [ 1069.547233] attempt to access beyond end of device [ 1069.550503] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1069.552730] loop5: rw=12288, want=12296, limit=20 [ 1069.562983] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (-1 log_block_size) [ 1069.592152] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1069.617046] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1069.626205] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1069.653366] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1069.672066] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1069.678309] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1069.697175] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:45:28 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0048000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:28 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000300"}, &(0x7f0000000080)=0x1e) 03:45:28 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x22, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:28 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x200000000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:28 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x74000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000002300c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1069.724324] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:28 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000500"}, &(0x7f0000000080)=0x1e) 03:45:28 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x2c, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1069.804195] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (-1 log_block_size) [ 1069.808467] gfs2: not a GFS2 filesystem 03:45:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec0000000100080000edc00000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:28 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x1000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1069.864112] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1069.877619] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1069.892776] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:28 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x46, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1069.943221] gfs2: not a GFS2 filesystem [ 1069.951603] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1069.957565] attempt to access beyond end of device [ 1069.958657] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1069.971498] loop5: rw=12288, want=8200, limit=20 [ 1069.975954] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1070.088340] attempt to access beyond end of device 03:45:28 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec0000008c0308000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000002000c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:28 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfdffffff00000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1070.122805] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1070.149975] loop5: rw=12288, want=12296, limit=20 [ 1070.167655] attempt to access beyond end of device [ 1070.205758] loop5: rw=12288, want=8200, limit=20 03:45:28 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0xa000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:28 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000100"}, &(0x7f0000000080)=0x1e) [ 1070.261287] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1070.263599] attempt to access beyond end of device [ 1070.268775] EXT4-fs (loop4): Invalid log block size: 12643584 [ 1070.329880] loop5: rw=12288, want=12296, limit=20 [ 1070.331763] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1070.367798] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1070.383798] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1070.408985] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1070.426103] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1070.439108] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1070.468866] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1070.483764] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1070.508164] EXT4-fs (loop4): Invalid log block size: 12643584 [ 1070.539338] attempt to access beyond end of device [ 1070.597283] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1070.614457] loop5: rw=12288, want=8200, limit=20 [ 1070.631850] gfs2: not a GFS2 filesystem [ 1070.657196] attempt to access beyond end of device [ 1070.681474] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1070.760318] loop5: rw=12288, want=12296, limit=20 [ 1070.770397] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1070.784441] attempt to access beyond end of device [ 1070.789520] loop5: rw=12288, want=8200, limit=20 [ 1070.794580] attempt to access beyond end of device [ 1070.799612] loop5: rw=12288, want=12296, limit=20 03:45:29 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) 03:45:29 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x13, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:29 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c004c000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:29 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x34000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008210000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000300c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:29 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xe0000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:29 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x1fffffe, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:29 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000ab0308000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:29 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0xffffff9e}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:29 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000200"}, &(0x7f0000000080)=0x1e) 03:45:29 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x4000000000000000, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:29 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x3f00}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:29 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000600"}, &(0x7f0000000080)=0x1e) [ 1071.002486] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1071.010003] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1071.033841] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1071.044590] attempt to access beyond end of device [ 1071.090835] loop5: rw=12288, want=8200, limit=20 [ 1071.103501] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1071.118395] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1071.135928] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1071.151699] attempt to access beyond end of device [ 1071.187650] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1071.204089] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1071.224903] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1071.255336] loop5: rw=12288, want=12296, limit=20 [ 1071.281383] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1071.286465] gfs2: not a GFS2 filesystem [ 1071.291712] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1071.297138] attempt to access beyond end of device [ 1071.333854] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1071.366712] loop5: rw=12288, want=8200, limit=20 [ 1071.376686] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1071.387760] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1071.423645] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:30 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0xff00000000000000, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1071.426831] attempt to access beyond end of device [ 1071.442391] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1071.461479] loop5: rw=12288, want=12296, limit=20 03:45:30 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x46612aeafc000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1071.481546] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:45:30 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000100"}, &(0x7f0000000080)=0x1e) 03:45:30 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x74, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1071.528693] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1071.706008] attempt to access beyond end of device [ 1071.750038] loop5: rw=12288, want=8200, limit=20 [ 1071.759066] gfs2: not a GFS2 filesystem [ 1071.789555] attempt to access beyond end of device [ 1071.822707] loop5: rw=12288, want=12296, limit=20 03:45:30 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000200900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000000000000500002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:30 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x1000000, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000680000c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:30 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000d40108000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:30 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000500"}, &(0x7f0000000080)=0x1e) 03:45:30 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0xffffff7f}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:30 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1071.845943] f2fs_msg: 40 callbacks suppressed [ 1071.845956] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 1071.875592] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1071.884023] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1071.895977] attempt to access beyond end of device [ 1071.901557] loop5: rw=12288, want=8200, limit=20 [ 1071.906574] attempt to access beyond end of device [ 1071.919211] loop5: rw=12288, want=12296, limit=20 [ 1071.925172] F2FS-fs (loop5): Failed to get valid F2FS checkpoint 03:45:30 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x2, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:30 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x17d4}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:30 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000400"}, &(0x7f0000000080)=0x1e) [ 1072.069405] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1072.089128] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1072.096738] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1072.111307] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1072.136462] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1072.137307] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1072.164370] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1072.200224] gfs2: not a GFS2 filesystem [ 1072.202467] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1072.232467] EXT4-fs (loop4): Invalid log cluster size: 327680 [ 1072.249977] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1072.269159] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1072.278982] attempt to access beyond end of device 03:45:30 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x40000000, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1072.307197] loop5: rw=12288, want=8200, limit=20 [ 1072.314335] gfs2: not a GFS2 filesystem [ 1072.327403] attempt to access beyond end of device 03:45:31 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x200000000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1072.359925] loop5: rw=12288, want=12296, limit=20 [ 1072.368930] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 1072.388394] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1072.402253] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1072.429561] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1072.455544] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1072.469873] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:45:31 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) [ 1072.479149] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:45:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffff00000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1072.522469] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:45:31 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0xfeffff01, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1072.564442] EXT4-fs (loop4): Invalid log cluster size: 327680 [ 1072.571942] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1072.584288] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1072.594456] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1072.626133] attempt to access beyond end of device [ 1072.656186] loop5: rw=12288, want=8200, limit=20 [ 1072.680177] attempt to access beyond end of device [ 1072.690866] loop5: rw=12288, want=12296, limit=20 [ 1072.702192] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 1072.740870] gfs2: not a GFS2 filesystem [ 1072.832296] attempt to access beyond end of device [ 1072.837283] loop5: rw=12288, want=8200, limit=20 [ 1072.889303] attempt to access beyond end of device [ 1072.917381] loop5: rw=12288, want=12296, limit=20 [ 1072.930500] attempt to access beyond end of device [ 1072.935458] loop5: rw=12288, want=8200, limit=20 [ 1072.949701] attempt to access beyond end of device [ 1072.955188] loop5: rw=12288, want=12296, limit=20 03:45:31 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0023000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000140000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:31 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0xa000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:31 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000200"}, &(0x7f0000000080)=0x1e) 03:45:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000030000c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:31 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x4000, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:31 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000620008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x97ffffff00000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:31 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) [ 1073.066334] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1073.090523] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1073.097522] EXT4-fs (loop7): Test dummy encryption mode enabled 03:45:31 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0xff00, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1073.121369] attempt to access beyond end of device [ 1073.122186] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1073.126338] loop5: rw=12288, want=8200, limit=20 [ 1073.126437] attempt to access beyond end of device [ 1073.152661] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1073.161937] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:45:31 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0xf000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1073.200055] EXT4-fs (loop4): Invalid log block size: 1310720 [ 1073.210043] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1073.224668] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1073.244080] loop5: rw=12288, want=12296, limit=20 [ 1073.264817] attempt to access beyond end of device [ 1073.289357] gfs2: not a GFS2 filesystem [ 1073.300657] loop5: rw=12288, want=8200, limit=20 [ 1073.309234] EXT4-fs (loop7): Test dummy encryption mode enabled 03:45:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x200000000000000, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1073.344432] attempt to access beyond end of device [ 1073.354190] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1073.403743] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1073.426790] loop5: rw=12288, want=12296, limit=20 [ 1073.439721] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:45:32 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) 03:45:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008020000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1073.447492] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:32 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0xfffffffffffff000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1073.502141] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x2000000, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1073.671566] attempt to access beyond end of device [ 1073.676732] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1073.698972] loop5: rw=12288, want=8200, limit=20 [ 1073.710061] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1073.717486] attempt to access beyond end of device [ 1073.718085] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1073.741784] loop5: rw=12288, want=12296, limit=20 [ 1073.762577] attempt to access beyond end of device [ 1073.767626] loop5: rw=12288, want=8200, limit=20 [ 1073.819993] attempt to access beyond end of device [ 1073.842429] loop5: rw=12288, want=12296, limit=20 03:45:32 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0002000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4000000000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:32 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000250008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:32 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) 03:45:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000020000c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0xff000000, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:32 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0xf0ffffff00000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1073.876302] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1073.890080] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1073.909987] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x100000000000000, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1074.002071] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1074.021466] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1074.031421] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1074.041731] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1074.064340] attempt to access beyond end of device 03:45:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000000000041000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:32 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000300"}, &(0x7f0000000080)=0x1e) [ 1074.086870] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1074.097502] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1074.113249] loop5: rw=12288, want=8200, limit=20 03:45:32 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x3000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1074.136330] attempt to access beyond end of device 03:45:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0xfeffff0100000000, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1074.182276] gfs2: not a GFS2 filesystem [ 1074.196148] loop5: rw=12288, want=12296, limit=20 [ 1074.208568] attempt to access beyond end of device [ 1074.224842] loop5: rw=12288, want=8200, limit=20 [ 1074.238148] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1074.244248] attempt to access beyond end of device [ 1074.244278] loop5: rw=12288, want=12296, limit=20 [ 1074.253172] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1074.265667] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1074.273515] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1074.284794] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1074.357224] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1074.371234] EXT4-fs (loop4): Test dummy encryption mode enabled 03:45:33 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) 03:45:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:33 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x100000000000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1074.416655] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1074.453684] EXT4-fs (loop4): Invalid log cluster size: 1049600 03:45:33 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0004000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:33 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x9effffff}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:33 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec0000000a0008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000006800c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1074.614830] attempt to access beyond end of device [ 1074.646145] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1074.681671] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1074.698888] loop5: rw=12288, want=8200, limit=20 03:45:33 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000500"}, &(0x7f0000000080)=0x1e) 03:45:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1074.730384] gfs2: not a GFS2 filesystem [ 1074.747561] EXT4-fs (loop4): Invalid log cluster size: 1049600 [ 1074.760725] attempt to access beyond end of device [ 1074.770205] EXT4-fs (loop1): Test dummy encryption mode enabled 03:45:33 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0xf0ffff}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1074.788097] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1074.802909] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1074.816378] loop5: rw=12288, want=12296, limit=20 [ 1074.817241] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1074.843577] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1074.857476] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1074.899515] attempt to access beyond end of device [ 1074.909015] loop5: rw=12288, want=8200, limit=20 [ 1074.935777] EXT4-fs (loop1): Test dummy encryption mode enabled 03:45:33 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000100"}, &(0x7f0000000080)=0x1e) 03:45:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008fffffff60000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1074.964169] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1074.976009] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1074.984667] attempt to access beyond end of device [ 1075.008839] loop5: rw=12288, want=12296, limit=20 [ 1075.025930] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1075.090087] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:45:33 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0xffffff9e}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:33 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1075.139577] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1075.177535] attempt to access beyond end of device 03:45:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000006000c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1075.240379] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1075.265585] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1075.279741] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (16187391 log_block_size) [ 1075.287291] loop5: rw=12288, want=8200, limit=20 [ 1075.310368] attempt to access beyond end of device 03:45:34 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) [ 1075.363507] loop5: rw=12288, want=12296, limit=20 03:45:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1075.398878] attempt to access beyond end of device [ 1075.419109] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1075.428888] loop5: rw=12288, want=8200, limit=20 [ 1075.449542] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1075.453075] attempt to access beyond end of device [ 1075.497744] loop5: rw=12288, want=12296, limit=20 [ 1075.510706] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1075.540138] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1075.587619] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (16187391 log_block_size) [ 1075.596984] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:34 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0001fe0900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:34 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000530008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:34 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0xfcea2a6146}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:34 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000500"}, &(0x7f0000000080)=0x1e) 03:45:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000800000fff0000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1075.708149] gfs2: not a GFS2 filesystem [ 1075.713124] EXT4-fs (loop1): Test dummy encryption mode enabled 03:45:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1075.760219] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1075.766297] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1075.799940] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:34 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) 03:45:34 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0xffffff7f00000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1075.861916] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1075.911340] attempt to access beyond end of device [ 1075.916576] loop5: rw=12288, want=8200, limit=20 [ 1075.950652] EXT4-fs (loop4): Test dummy encryption mode enabled 03:45:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000400c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1075.960078] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1075.977099] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1075.992139] attempt to access beyond end of device [ 1076.019128] loop5: rw=12288, want=12296, limit=20 03:45:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:34 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x500, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1076.043843] attempt to access beyond end of device [ 1076.054179] loop5: rw=12288, want=8200, limit=20 [ 1076.056184] EXT4-fs (loop4): Invalid log block size: 16715520 03:45:34 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000200"}, &(0x7f0000000080)=0x1e) [ 1076.102680] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1076.130209] attempt to access beyond end of device [ 1076.166193] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1076.185687] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1076.200162] loop5: rw=12288, want=12296, limit=20 03:45:34 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0xf00000000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1076.240411] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1076.251274] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1076.280541] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1076.281524] attempt to access beyond end of device [ 1076.295421] loop5: rw=12288, want=8200, limit=20 [ 1076.305447] attempt to access beyond end of device [ 1076.317460] loop5: rw=12288, want=12296, limit=20 [ 1076.350657] attempt to access beyond end of device 03:45:35 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000008f08000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1076.381473] loop5: rw=12288, want=8200, limit=20 [ 1076.400943] attempt to access beyond end of device [ 1076.410484] loop5: rw=12288, want=12296, limit=20 [ 1076.440887] gfs2: not a GFS2 filesystem 03:45:35 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c00004c0900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:35 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) 03:45:35 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008004000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff0000000000fcc9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:35 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0xffffff7f}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:35 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:35 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000500"}, &(0x7f0000000080)=0x1e) [ 1076.645954] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1076.670550] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1076.708630] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1076.793465] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1076.800661] EXT4-fs (loop4): Test dummy encryption mode enabled 03:45:35 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:35 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xe, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1076.833948] attempt to access beyond end of device [ 1076.850939] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1076.871594] loop5: rw=12288, want=8200, limit=20 [ 1076.892043] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1076.901232] attempt to access beyond end of device [ 1076.919442] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1076.933836] EXT4-fs (loop7): Test dummy encryption mode enabled 03:45:35 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x34000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1076.943747] EXT4-fs (loop4): Invalid log block size: 64 [ 1076.951977] loop5: rw=12288, want=12296, limit=20 [ 1076.991198] f2fs_msg: 50 callbacks suppressed [ 1076.991219] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 1077.010851] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1077.014128] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1077.017146] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1077.033349] EXT4-fs (loop4): Invalid log block size: 64 [ 1077.039360] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1077.080697] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:35 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1077.093603] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock 03:45:35 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000600"}, &(0x7f0000000080)=0x1e) [ 1077.137761] attempt to access beyond end of device [ 1077.143382] loop5: rw=12288, want=8200, limit=20 [ 1077.157434] attempt to access beyond end of device [ 1077.171638] loop5: rw=12288, want=12296, limit=20 03:45:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000000000000300002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:35 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000720008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:35 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x300000000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1077.188731] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 1077.214988] gfs2: not a GFS2 filesystem [ 1077.292156] gfs2: not a GFS2 filesystem [ 1077.329214] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1077.390560] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1077.399603] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1077.443363] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1077.473587] attempt to access beyond end of device [ 1077.490334] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1077.506126] loop5: rw=12288, want=8200, limit=20 [ 1077.520004] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1077.527685] EXT4-fs (loop4): Invalid log cluster size: 196608 [ 1077.540092] attempt to access beyond end of device [ 1077.547614] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1077.562323] loop5: rw=12288, want=12296, limit=20 [ 1077.568719] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 1077.587926] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1077.610151] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1077.610697] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1077.618675] attempt to access beyond end of device [ 1077.632353] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1077.646894] EXT4-fs (loop4): Invalid log cluster size: 196608 [ 1077.655868] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1077.670185] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1077.680377] loop5: rw=12288, want=8200, limit=20 [ 1077.680962] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1077.685329] attempt to access beyond end of device [ 1077.699539] loop5: rw=12288, want=12296, limit=20 [ 1077.713866] F2FS-fs (loop5): Failed to get valid F2FS checkpoint 03:45:36 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0005000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000014c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:36 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000400"}, &(0x7f0000000080)=0x1e) 03:45:36 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x2, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfdfdffff00000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:36 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x100000000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000000000000a00002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:36 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000a70308000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:36 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0xff00000000000000, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1077.905217] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1077.940342] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1077.952537] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1077.993484] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1078.028186] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:36 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000200"}, &(0x7f0000000080)=0x1e) 03:45:36 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0xd417000000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:36 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x1000000, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1078.045217] EXT4-fs (loop4): Invalid log cluster size: 655360 [ 1078.074828] attempt to access beyond end of device [ 1078.080277] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1078.086519] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1078.139940] loop5: rw=12288, want=8200, limit=20 [ 1078.166754] attempt to access beyond end of device [ 1078.174228] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1078.183614] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1078.211354] gfs2: not a GFS2 filesystem [ 1078.224908] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1078.238506] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:45:36 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000600"}, &(0x7f0000000080)=0x1e) [ 1078.263831] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1078.265208] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1078.276230] EXT4-fs (loop4): Invalid log cluster size: 655360 [ 1078.286663] loop5: rw=12288, want=12296, limit=20 03:45:37 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0xd4170000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1078.317802] attempt to access beyond end of device 03:45:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000068c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1078.344100] loop5: rw=12288, want=8200, limit=20 [ 1078.360733] attempt to access beyond end of device [ 1078.380174] loop5: rw=12288, want=12296, limit=20 03:45:37 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x1fffffe, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1078.457968] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1078.532975] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1078.565303] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1078.632675] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1078.659509] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:45:37 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0009000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:37 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000400"}, &(0x7f0000000080)=0x1e) 03:45:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008ffffffeb0000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:37 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x100000000000000, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:37 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x300000000000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:37 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:37 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000050008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1078.680317] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:37 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x200000000000000, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:37 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000600"}, &(0x7f0000000080)=0x1e) [ 1078.815333] EXT4-fs (loop4): Test dummy encryption mode enabled 03:45:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000002300c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1078.875478] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1078.880570] attempt to access beyond end of device [ 1078.931424] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1078.951101] loop5: rw=12288, want=8200, limit=20 [ 1078.969171] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:37 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) [ 1078.970373] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:45:37 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x3}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1079.015805] attempt to access beyond end of device 03:45:37 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x2000000, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1079.044331] gfs2: not a GFS2 filesystem [ 1079.049936] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (15466495 log_block_size) [ 1079.077759] loop5: rw=12288, want=12296, limit=20 [ 1079.087166] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1079.106416] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1079.120652] attempt to access beyond end of device [ 1079.127106] loop5: rw=12288, want=8200, limit=20 [ 1079.137327] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1079.168861] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1079.180661] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1079.186880] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1079.207327] attempt to access beyond end of device [ 1079.230185] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1079.251441] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (15466495 log_block_size) [ 1079.262995] loop5: rw=12288, want=12296, limit=20 03:45:37 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0xff00, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:37 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0xfffffff0}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:37 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x60000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1079.279133] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1079.429460] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1079.431128] attempt to access beyond end of device [ 1079.482161] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1079.532608] loop5: rw=12288, want=8200, limit=20 [ 1079.550100] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1079.564545] attempt to access beyond end of device [ 1079.569499] loop5: rw=12288, want=12296, limit=20 [ 1079.588664] attempt to access beyond end of device [ 1079.601814] loop5: rw=12288, want=8200, limit=20 [ 1079.609676] attempt to access beyond end of device [ 1079.658522] loop5: rw=12288, want=12296, limit=20 03:45:38 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000740900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:38 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) 03:45:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000000000010000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:38 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010021000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:38 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x4000000000000000, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:38 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0xf}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000006c00c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1079.792431] gfs2: not a GFS2 filesystem [ 1079.819190] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1079.819231] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1079.831836] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1079.840414] EXT4-fs (loop4): Invalid log cluster size: 256 03:45:38 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) [ 1079.892128] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1079.902784] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1079.920273] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1079.921505] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1079.932234] EXT4-fs (loop4): Invalid log cluster size: 256 03:45:38 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0xfeffff0100000000, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:38 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0xa}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1079.949068] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1079.970706] attempt to access beyond end of device [ 1080.028322] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1080.059913] loop5: rw=12288, want=8200, limit=20 [ 1080.069126] attempt to access beyond end of device 03:45:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000000000002300002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1080.105859] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1080.112492] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1080.119892] loop5: rw=12288, want=12296, limit=20 03:45:38 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) [ 1080.150357] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1080.167425] attempt to access beyond end of device [ 1080.180094] loop5: rw=12288, want=8200, limit=20 03:45:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4c00, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:38 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x9effffff00000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1080.199345] attempt to access beyond end of device [ 1080.213030] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:38 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x40000000, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1080.271755] loop5: rw=12288, want=12296, limit=20 [ 1080.287179] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1080.313439] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1080.345473] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1080.356623] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:45:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff00000000003fc9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1080.429002] EXT4-fs (loop4): Invalid log cluster size: 2293760 [ 1080.441538] attempt to access beyond end of device [ 1080.466431] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1080.494041] loop5: rw=12288, want=8200, limit=20 [ 1080.531802] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1080.537068] attempt to access beyond end of device [ 1080.562422] loop5: rw=12288, want=12296, limit=20 [ 1080.585060] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1080.585473] attempt to access beyond end of device [ 1080.640180] EXT4-fs (loop4): Invalid log cluster size: 2293760 [ 1080.649470] loop5: rw=12288, want=8200, limit=20 [ 1080.656359] gfs2: not a GFS2 filesystem [ 1080.672698] attempt to access beyond end of device [ 1080.683598] loop5: rw=12288, want=12296, limit=20 03:45:39 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000600900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:39 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000200"}, &(0x7f0000000080)=0x1e) 03:45:39 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0xff000000, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:39 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x1000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:39 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010062000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000000000000700002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:39 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0xfeffff01, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1080.790696] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1080.803953] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1080.821519] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1080.890178] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1080.900342] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:45:39 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x2000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1080.938009] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1080.944897] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:39 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000400"}, &(0x7f0000000080)=0x1e) [ 1081.013794] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1081.030191] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1081.046638] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:45:39 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x4000, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:45:39 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7a, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1081.077665] attempt to access beyond end of device [ 1081.084395] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1081.108841] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1081.186579] loop5: rw=12288, want=8200, limit=20 [ 1081.188426] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1081.203198] EXT4-fs (loop4): Invalid log cluster size: 458752 [ 1081.237017] attempt to access beyond end of device [ 1081.245083] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:39 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x40000000, @ipv4={[], [], @local}}}}, 0x90) 03:45:39 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x2}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1081.283054] loop5: rw=12288, want=12296, limit=20 03:45:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff00000000ffe0c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:40 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) [ 1081.329190] attempt to access beyond end of device 03:45:40 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010009000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1081.356245] loop5: rw=12288, want=8200, limit=20 [ 1081.368555] attempt to access beyond end of device [ 1081.375502] loop5: rw=12288, want=12296, limit=20 [ 1081.465640] gfs2: not a GFS2 filesystem [ 1081.523237] attempt to access beyond end of device [ 1081.572310] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1081.603965] gfs2: not a GFS2 filesystem [ 1081.609042] loop5: rw=12288, want=8200, limit=20 [ 1081.625924] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1081.662897] attempt to access beyond end of device [ 1081.681758] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1081.701171] loop5: rw=12288, want=12296, limit=20 [ 1081.738132] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1081.760246] attempt to access beyond end of device [ 1081.780000] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1081.788121] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1081.819103] loop5: rw=12288, want=8200, limit=20 [ 1081.835147] attempt to access beyond end of device [ 1081.844502] loop5: rw=12288, want=12296, limit=20 03:45:40 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000004e00000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000000000001400002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x1000000, @ipv4={[], [], @local}}}}, 0x90) 03:45:40 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0xd417}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:40 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000ffffffff00"}, &(0x7f0000000080)=0x1e) 03:45:40 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1081.887435] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1081.893966] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1081.901954] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000410c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x2000000, @ipv4={[], [], @local}}}}, 0x90) 03:45:40 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000100"}, &(0x7f0000000080)=0x1e) [ 1082.032118] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1082.038290] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1082.038307] EXT4-fs (loop4): Invalid log cluster size: 1310720 03:45:40 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010708000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:40 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x300}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0xff00000000000000, @ipv4={[], [], @local}}}}, 0x90) [ 1082.134535] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1082.165667] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:45:40 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) [ 1082.215145] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1082.231650] f2fs_msg: 42 callbacks suppressed [ 1082.231663] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1082.249206] gfs2: not a GFS2 filesystem [ 1082.307422] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1082.327841] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1082.360696] F2FS-fs (loop5): Invalid log blocks per segment (78) [ 1082.360696] [ 1082.372396] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1082.383057] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:45:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0xff000000, @ipv4={[], [], @local}}}}, 0x90) 03:45:41 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0xa00}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1082.417839] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1082.437038] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1082.446954] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock [ 1082.458195] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1082.477911] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1082.489900] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1082.511165] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:45:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4000000000000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1082.528712] EXT4-fs (loop4): Invalid log cluster size: 1310720 [ 1082.536037] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1082.563393] F2FS-fs (loop5): Invalid log blocks per segment (78) [ 1082.563393] [ 1082.632222] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock [ 1082.683925] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1082.719830] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1082.732426] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1082.748646] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1082.773470] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock 03:45:41 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000740900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:41 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000300"}, &(0x7f0000000080)=0x1e) 03:45:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000006800c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:41 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0xfffff000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x4000, @ipv4={[], [], @local}}}}, 0x90) 03:45:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000000000000100002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:41 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010508000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x2, @ipv4={[], [], @local}}}}, 0x90) [ 1082.930134] gfs2: not a GFS2 filesystem [ 1082.964988] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1082.990740] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1083.011610] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1083.018353] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1083.027089] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1083.047646] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1083.056244] EXT4-fs (loop4): Invalid log cluster size: 65536 03:45:41 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0xf0ffffff}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1083.072103] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1083.098953] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:41 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000300"}, &(0x7f0000000080)=0x1e) [ 1083.143684] attempt to access beyond end of device [ 1083.161257] EXT4-fs (loop4): Test dummy encryption mode enabled 03:45:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x4000000000000000, @ipv4={[], [], @local}}}}, 0x90) [ 1083.194492] loop5: rw=12288, want=8200, limit=20 03:45:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffff7f00000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1083.223830] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1083.242468] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1083.267164] attempt to access beyond end of device [ 1083.278216] EXT4-fs (loop4): Invalid log cluster size: 65536 [ 1083.292090] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1083.316753] loop5: rw=12288, want=12296, limit=20 [ 1083.330050] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1083.337542] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1083.341126] attempt to access beyond end of device [ 1083.352049] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1083.367993] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:42 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0xf000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:42 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x200000000000000, @ipv4={[], [], @local}}}}, 0x90) 03:45:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008600000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:42 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000600"}, &(0x7f0000000080)=0x1e) [ 1083.486708] loop5: rw=12288, want=8200, limit=20 [ 1083.528077] attempt to access beyond end of device [ 1083.533740] loop5: rw=12288, want=12296, limit=20 [ 1083.656557] gfs2: not a GFS2 filesystem [ 1083.671999] attempt to access beyond end of device [ 1083.691995] loop5: rw=12288, want=8200, limit=20 [ 1083.728088] attempt to access beyond end of device [ 1083.739311] loop5: rw=12288, want=12296, limit=20 [ 1083.751534] attempt to access beyond end of device [ 1083.758204] loop5: rw=12288, want=8200, limit=20 [ 1083.765888] attempt to access beyond end of device [ 1083.771897] loop5: rw=12288, want=12296, limit=20 [ 1083.808109] EXT4-fs (loop4): Test dummy encryption mode enabled 03:45:42 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c00007a0900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:42 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000012108000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000001400c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:42 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0xfeffff01, @ipv4={[], [], @local}}}}, 0x90) 03:45:42 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0xf00}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:42 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000300"}, &(0x7f0000000080)=0x1e) [ 1083.848341] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:45:42 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x1fffffe, @ipv4={[], [], @local}}}}, 0x90) 03:45:42 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7a000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1083.913312] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1083.940451] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1083.955357] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1083.988837] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1084.032824] attempt to access beyond end of device [ 1084.037690] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1084.038613] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:42 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000500"}, &(0x7f0000000080)=0x1e) [ 1084.078228] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1084.091593] loop5: rw=12288, want=8200, limit=20 [ 1084.097460] attempt to access beyond end of device [ 1084.111542] EXT4-fs (loop4): Test dummy encryption mode enabled 03:45:42 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0xf0ffffffffffff}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1084.133979] loop5: rw=12288, want=12296, limit=20 [ 1084.153232] attempt to access beyond end of device [ 1084.161446] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1084.177244] loop5: rw=12288, want=8200, limit=20 03:45:42 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x100000000000000, @ipv4={[], [], @local}}}}, 0x90) [ 1084.203196] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1084.215080] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1084.250551] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1084.256687] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1084.257130] attempt to access beyond end of device [ 1084.279084] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:45:42 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000000000200"}, &(0x7f0000000080)=0x1e) [ 1084.298152] loop5: rw=12288, want=12296, limit=20 03:45:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000800000000ffffffeb00002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:43 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0xfeffff0100000000, @ipv4={[], [], @local}}}}, 0x90) 03:45:43 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0xa00000000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1084.360030] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1084.369904] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1084.391386] gfs2: not a GFS2 filesystem 03:45:43 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010700000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1084.608616] attempt to access beyond end of device [ 1084.614248] loop5: rw=12288, want=8200, limit=20 [ 1084.619350] attempt to access beyond end of device [ 1084.682051] loop5: rw=12288, want=12296, limit=20 [ 1084.691297] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1084.697388] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1084.706492] attempt to access beyond end of device [ 1084.737873] loop5: rw=12288, want=8200, limit=20 [ 1084.751968] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1084.760216] attempt to access beyond end of device [ 1084.777709] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1084.783600] loop5: rw=12288, want=12296, limit=20 [ 1084.798254] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1084.806994] EXT4-fs (loop4): Invalid log block size: 4278190080 03:45:43 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c00000a0900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:43 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000600"}, &(0x7f0000000080)=0x1e) 03:45:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000800c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:43 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0xff00, @ipv4={[], [], @local}}}}, 0x90) 03:45:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:43 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x3f000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1084.913313] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1084.919743] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1084.930117] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:43 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0xff000000], [], @local}}}}, 0x90) [ 1084.966801] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1084.981580] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:45:43 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x46612aeafc000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1085.021975] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1085.030003] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1085.037521] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:43 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000500"}, &(0x7f0000000080)=0x1e) [ 1085.083745] EXT4-fs (loop4): Invalid log block size: 4278190080 [ 1085.116021] attempt to access beyond end of device 03:45:43 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010007000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1085.142942] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1085.161644] loop5: rw=12288, want=8200, limit=20 [ 1085.167829] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1085.221290] attempt to access beyond end of device [ 1085.257641] loop5: rw=12288, want=12296, limit=20 03:45:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000030000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1085.280616] gfs2: not a GFS2 filesystem [ 1085.300591] attempt to access beyond end of device [ 1085.306594] loop5: rw=12288, want=8200, limit=20 [ 1085.335434] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1085.354547] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1085.370428] attempt to access beyond end of device 03:45:44 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x400300}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:44 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) 03:45:44 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x2000000], [], @local}}}}, 0x90) [ 1085.389211] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1085.412852] loop5: rw=12288, want=12296, limit=20 [ 1085.426560] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2300000000000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000200c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1085.520642] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1085.570040] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1085.603775] attempt to access beyond end of device [ 1085.610134] EXT4-fs (loop4): Invalid log block size: 196608 [ 1085.670560] loop5: rw=12288, want=8200, limit=20 [ 1085.675438] attempt to access beyond end of device [ 1085.697008] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1085.729717] loop5: rw=12288, want=12296, limit=20 [ 1085.748247] attempt to access beyond end of device [ 1085.781345] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1085.787669] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1085.791613] loop5: rw=12288, want=8200, limit=20 [ 1085.803197] attempt to access beyond end of device [ 1085.808659] loop5: rw=12288, want=12296, limit=20 [ 1085.817870] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:45:44 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000230900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:44 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0xff00], [], @local}}}}, 0x90) 03:45:44 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000000000400"}, &(0x7f0000000080)=0x1e) 03:45:44 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001003f000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:44 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x3f00}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1085.827240] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1085.836328] EXT4-fs (loop4): Invalid log block size: 196608 [ 1085.941613] gfs2: not a GFS2 filesystem 03:45:44 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x100000000000000], [], @local}}}}, 0x90) [ 1085.977488] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1085.977496] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1085.977512] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:45:44 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000ffffffff00"}, &(0x7f0000000080)=0x1e) 03:45:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000200000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1086.046594] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1086.098917] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1086.123763] attempt to access beyond end of device 03:45:44 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0xf0}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:44 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0xff00000000000000], [], @local}}}}, 0x90) [ 1086.146188] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1086.165783] loop5: rw=12288, want=8200, limit=20 [ 1086.215784] attempt to access beyond end of device 03:45:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4800000000000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1086.249637] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1086.260656] loop5: rw=12288, want=12296, limit=20 [ 1086.305027] attempt to access beyond end of device 03:45:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000002100c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:45 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) [ 1086.338791] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:45:45 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0xfeffff0100000000], [], @local}}}}, 0x90) [ 1086.382315] loop5: rw=12288, want=8200, limit=20 [ 1086.390038] attempt to access beyond end of device [ 1086.410903] EXT4-fs (loop4): Invalid log block size: 2097152 03:45:45 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x3f00000000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:45 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010408000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1086.501426] loop5: rw=12288, want=12296, limit=20 [ 1086.533980] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1086.593114] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1086.599226] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1086.650180] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1086.700638] EXT4-fs (loop4): Invalid log block size: 2097152 [ 1086.708977] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:45 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x200000000000000], [], @local}}}}, 0x90) 03:45:45 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000600"}, &(0x7f0000000080)=0x1e) 03:45:45 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000300000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:45 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000000000002000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:45 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x4000000000000000], [], @local}}}}, 0x90) [ 1086.813293] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1086.824387] gfs2: not a GFS2 filesystem [ 1086.848199] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1086.863912] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1086.884182] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:45:45 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xf0ffffff}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1086.930039] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1086.942805] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:45 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) [ 1087.062737] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1087.072265] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1087.083049] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1087.100711] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1087.108311] EXT4-fs (loop4): Invalid log cluster size: 2097152 03:45:45 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x1000000], [], @local}}}}, 0x90) 03:45:45 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000300"}, &(0x7f0000000080)=0x1e) 03:45:45 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x48000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000003c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:45 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000500000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:45 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1087.170558] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1087.311913] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1087.318045] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:45:46 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010006000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1087.394249] f2fs_msg: 56 callbacks suppressed [ 1087.394303] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:45:46 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x2], [], @local}}}}, 0x90) [ 1087.435081] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1087.441368] EXT4-fs (loop4): Invalid log cluster size: 2097152 [ 1087.486681] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1087.506543] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock 03:45:46 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) 03:45:46 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xd417000000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1087.541184] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1087.560104] F2FS-fs (loop5): Invalid log blocks per segment (5) [ 1087.560104] 03:45:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000800000000fffffff600002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1087.605096] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1087.637199] gfs2: not a GFS2 filesystem 03:45:46 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0xfeffff01], [], @local}}}}, 0x90) [ 1087.662470] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1087.669977] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock [ 1087.677599] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1087.701445] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:45:46 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000500"}, &(0x7f0000000080)=0x1e) [ 1087.742739] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1087.754339] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1087.804575] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1087.843699] EXT4-fs (loop4): Test dummy encryption mode enabled 03:45:46 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x40000000], [], @local}}}}, 0x90) [ 1087.850548] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:46 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xd4170000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:46 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1f00, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1087.881177] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1087.890436] F2FS-fs (loop5): Invalid log blocks per segment (5) [ 1087.890436] [ 1087.917932] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock [ 1087.929013] EXT4-fs (loop4): Invalid log block size: 4278190080 03:45:46 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) [ 1088.028826] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1088.039636] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1088.065127] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:45:46 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x1fffffe], [], @local}}}}, 0x90) 03:45:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000009c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1088.087985] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock 03:45:46 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010043000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1088.140101] EXT4-fs (loop4): Invalid log block size: 4278190080 [ 1088.289970] gfs2: not a GFS2 filesystem [ 1088.316517] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1088.339939] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:45:47 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000001400000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000000000002d00002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:47 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:47 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) 03:45:47 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x4000], [], @local}}}}, 0x90) [ 1088.362392] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1088.368580] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1088.432819] EXT4-fs (loop4): Test dummy encryption mode enabled 03:45:47 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x2], [], @local}}}}, 0x90) 03:45:47 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:47 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3f00, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1088.497897] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1088.507904] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1088.526219] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1088.573697] EXT4-fs (loop4): Invalid log cluster size: 2949120 03:45:47 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000000000600"}, &(0x7f0000000080)=0x1e) 03:45:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff00000000004cc9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1088.738298] EXT4-fs (loop4): Test dummy encryption mode enabled 03:45:47 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000600000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:47 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001002d000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:47 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x1fffffe], [], @local}}}}, 0x90) [ 1088.801023] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:45:47 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) 03:45:47 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x34000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1088.889544] EXT4-fs (loop4): Invalid log cluster size: 2949120 [ 1088.959423] gfs2: not a GFS2 filesystem [ 1088.980995] EXT4-fs (loop1): Test dummy encryption mode enabled 03:45:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000050000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1089.021920] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:45:47 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0xfeffff01], [], @local}}}}, 0x90) [ 1089.063977] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1089.087992] EXT4-fs (loop7): Test dummy encryption mode enabled 03:45:47 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000400"}, &(0x7f0000000080)=0x1e) [ 1089.159930] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1089.173214] EXT4-fs (loop1): Test dummy encryption mode enabled 03:45:47 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xfffffffffffff000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:47 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x4000], [], @local}}}}, 0x90) [ 1089.243322] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1089.245149] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1089.280638] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:48 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000020900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:48 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1089.315821] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1089.341187] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:48 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) [ 1089.400379] EXT4-fs (loop4): Invalid log block size: 327680 [ 1089.408428] EXT4-fs (loop7): Test dummy encryption mode enabled 03:45:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000007c0cc9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:48 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0xff00000000000000], [], @local}}}}, 0x90) [ 1089.522454] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1089.544633] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1089.557083] attempt to access beyond end of device [ 1089.560037] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1089.569549] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1089.630867] loop5: rw=12288, want=8200, limit=20 03:45:48 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x300000000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1089.651326] EXT4-fs (loop4): Invalid log block size: 327680 [ 1089.660337] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1089.662116] attempt to access beyond end of device 03:45:48 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000300"}, &(0x7f0000000080)=0x1e) [ 1089.700163] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1089.713581] loop5: rw=12288, want=12296, limit=20 [ 1089.719654] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1089.734080] attempt to access beyond end of device [ 1089.740168] loop5: rw=12288, want=8200, limit=20 [ 1089.757026] attempt to access beyond end of device [ 1089.764724] loop5: rw=12288, want=12296, limit=20 [ 1089.848992] gfs2: not a GFS2 filesystem [ 1089.865649] EXT4-fs (loop1): Test dummy encryption mode enabled 03:45:48 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000d000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:48 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x40000000], [], @local}}}}, 0x90) 03:45:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008041000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1089.903749] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:45:48 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000200"}, &(0x7f0000000080)=0x1e) [ 1089.953050] EXT4-fs (loop4): Test dummy encryption mode enabled 03:45:48 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x2000000], [], @local}}}}, 0x90) [ 1089.997842] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:48 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000090900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:48 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa00000000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1090.082842] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:45:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000300c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1090.147472] EXT4-fs (loop7): Test dummy encryption mode enabled 03:45:48 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000400"}, &(0x7f0000000080)=0x1e) 03:45:48 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x10000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:48 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0xff000000], [], @local}}}}, 0x90) [ 1090.205549] EXT4-fs (loop4): Unsupported filesystem blocksize 67108864 (16 log_block_size) [ 1090.221828] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1090.291876] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1090.296446] attempt to access beyond end of device [ 1090.365898] loop5: rw=12288, want=8200, limit=20 [ 1090.388006] attempt to access beyond end of device 03:45:49 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000100"}, &(0x7f0000000080)=0x1e) 03:45:49 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x1000000], [], @local}}}}, 0x90) 03:45:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000230000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:49 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xf0ffff}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1090.430528] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1090.446619] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1090.458803] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1090.465251] loop5: rw=12288, want=12296, limit=20 [ 1090.491047] attempt to access beyond end of device [ 1090.498633] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1090.539887] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1090.549877] loop5: rw=12288, want=8200, limit=20 [ 1090.592879] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1090.610193] attempt to access beyond end of device [ 1090.621632] loop5: rw=12288, want=12296, limit=20 [ 1090.644585] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1090.659127] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:45:49 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0xff00], [], @local}}}}, 0x90) [ 1090.700155] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1090.732541] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1090.739701] attempt to access beyond end of device [ 1090.750998] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1090.776646] loop5: rw=12288, want=8200, limit=20 [ 1090.790098] EXT4-fs (loop4): Invalid log block size: 2293760 03:45:49 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010308000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:49 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000200"}, &(0x7f0000000080)=0x1e) [ 1090.818474] gfs2: not a GFS2 filesystem [ 1090.831389] attempt to access beyond end of device 03:45:49 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x17d4}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1090.867481] loop5: rw=12288, want=12296, limit=20 03:45:49 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x200000000000000], [], @local}}}}, 0x90) 03:45:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000040c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1090.893669] attempt to access beyond end of device [ 1090.929999] loop5: rw=12288, want=8200, limit=20 [ 1090.934997] attempt to access beyond end of device [ 1090.978322] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1091.020011] loop5: rw=12288, want=12296, limit=20 [ 1091.028677] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1091.088508] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:49 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c00006c0900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008001400000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:49 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000600"}, &(0x7f0000000080)=0x1e) 03:45:49 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0xfeffff0100000000], [], @local}}}}, 0x90) 03:45:49 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8cffffff00000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:49 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xf}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1091.180422] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1091.181139] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1091.193528] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1091.214957] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:49 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000500"}, &(0x7f0000000080)=0x1e) 03:45:49 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x4000000000000000], [], @local}}}}, 0x90) [ 1091.264286] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1091.320309] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:50 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010a08000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1091.364536] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1091.400502] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1091.450228] EXT4-fs (loop4): Unsupported filesystem blocksize 1073741824 (20 log_block_size) [ 1091.460259] attempt to access beyond end of device 03:45:50 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x100000000000000], [], @local}}}}, 0x90) [ 1091.491317] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1091.510202] loop5: rw=12288, want=8200, limit=20 [ 1091.528576] attempt to access beyond end of device 03:45:50 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xfcea2a6146}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1091.549599] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1091.572738] loop5: rw=12288, want=12296, limit=20 [ 1091.575359] EXT4-fs (loop4): Test dummy encryption mode enabled 03:45:50 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) [ 1091.628538] attempt to access beyond end of device [ 1091.640088] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1091.646463] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:45:50 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x200000000000000], [], @local}}}}, 0x90) [ 1091.697727] loop5: rw=12288, want=8200, limit=20 [ 1091.710372] gfs2: not a GFS2 filesystem [ 1091.726525] attempt to access beyond end of device [ 1091.732509] EXT4-fs (loop4): Unsupported filesystem blocksize 1073741824 (20 log_block_size) 03:45:50 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000001004c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1091.748742] loop5: rw=12288, want=12296, limit=20 03:45:50 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000300"}, &(0x7f0000000080)=0x1e) [ 1091.806409] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1091.815496] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1091.824380] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1091.970100] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1091.976580] attempt to access beyond end of device [ 1091.987999] loop5: rw=12288, want=8200, limit=20 [ 1092.005598] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1092.037389] attempt to access beyond end of device [ 1092.049362] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1092.063882] loop5: rw=12288, want=12296, limit=20 [ 1092.068950] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1092.079345] attempt to access beyond end of device [ 1092.091831] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1092.139105] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1092.153638] loop5: rw=12288, want=8200, limit=20 [ 1092.187098] attempt to access beyond end of device [ 1092.200060] loop5: rw=12288, want=12296, limit=20 03:45:50 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000060900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:50 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x40000000], [], @local}}}}, 0x90) 03:45:50 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000000000100"}, &(0x7f0000000080)=0x1e) 03:45:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008060000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:50 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xffffff7f00000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:50 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf8010000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:50 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000a000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:51 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x2000000], [], @local}}}}, 0x90) 03:45:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000021c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1092.366412] EXT4-fs (loop4): Test dummy encryption mode enabled 03:45:51 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xffffff9e}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1092.413364] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1092.419885] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1092.427499] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1092.490125] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1092.519135] f2fs_msg: 68 callbacks suppressed [ 1092.519148] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:45:51 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000000000300"}, &(0x7f0000000080)=0x1e) [ 1092.540459] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1092.550606] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock 03:45:51 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0xff00], [], @local}}}}, 0x90) [ 1092.583682] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1092.583742] gfs2: not a GFS2 filesystem [ 1092.598232] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1092.606693] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1092.612210] attempt to access beyond end of device [ 1092.648095] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1092.675194] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1092.679410] loop5: rw=12288, want=8200, limit=20 [ 1092.699940] attempt to access beyond end of device [ 1092.729155] loop5: rw=12288, want=12296, limit=20 [ 1092.740856] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1092.744171] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1092.755180] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1092.764291] F2FS-fs (loop5): Failed to get valid F2FS checkpoint 03:45:51 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:51 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x1fffffe], [], @local}}}}, 0x90) 03:45:51 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000000000500"}, &(0x7f0000000080)=0x1e) [ 1092.810701] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1092.835290] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1092.851375] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1092.898530] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1092.935349] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1092.948748] attempt to access beyond end of device 03:45:51 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1092.977504] loop5: rw=12288, want=8200, limit=20 [ 1093.011299] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1093.020412] attempt to access beyond end of device [ 1093.025844] loop5: rw=12288, want=12296, limit=20 [ 1093.087958] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 1093.198143] gfs2: not a GFS2 filesystem [ 1093.242210] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1093.251220] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1093.290302] attempt to access beyond end of device [ 1093.295317] loop5: rw=12288, want=8200, limit=20 [ 1093.348085] attempt to access beyond end of device [ 1093.353866] loop5: rw=12288, want=12296, limit=20 [ 1093.358945] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 1093.371744] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1093.379182] attempt to access beyond end of device [ 1093.384823] loop5: rw=12288, want=8200, limit=20 [ 1093.390340] attempt to access beyond end of device [ 1093.400606] loop5: rw=12288, want=12296, limit=20 03:45:52 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000e00000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:52 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x100000000000000], [], @local}}}}, 0x90) 03:45:52 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010208000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008090000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:52 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) 03:45:52 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xf000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff00000000fc00c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1f000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:52 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x4000000000000000], [], @local}}}}, 0x90) [ 1093.501615] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1093.502352] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1093.536465] EXT4-fs (loop7): Test dummy encryption mode enabled 03:45:52 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000500"}, &(0x7f0000000080)=0x1e) [ 1093.551765] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1093.560055] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1093.570158] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1093.577641] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:52 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x3f000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1093.597638] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1093.612343] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1093.655300] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1093.687754] gfs2: not a GFS2 filesystem [ 1093.708476] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:45:52 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000001200000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1093.757952] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1093.778130] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:52 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x4000], [], @local}}}}, 0x90) 03:45:52 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) [ 1093.829680] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1093.837515] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1093.872468] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:45:52 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xf00}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1093.919948] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1093.960000] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:52 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000012308000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:52 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x2], [], @local}}}}, 0x90) 03:45:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008100400000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000007c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:52 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000400"}, &(0x7f0000000080)=0x1e) 03:45:52 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0xfeffff0100000000], [], @local}}}}, 0x90) 03:45:52 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x300}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:52 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000070900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1094.242670] gfs2: not a GFS2 filesystem [ 1094.263199] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1094.274045] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1094.301913] gfs2: not a GFS2 filesystem 03:45:53 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0xff000000], [], @local}}}}, 0x90) [ 1094.306520] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1094.391340] attempt to access beyond end of device [ 1094.391586] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1094.405821] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1094.450125] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1094.457728] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1094.468218] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1094.483543] loop5: rw=12288, want=8200, limit=20 03:45:53 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0xfeffff01], [], @local}}}}, 0x90) 03:45:53 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000000000200"}, &(0x7f0000000080)=0x1e) [ 1094.498351] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1094.510157] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1094.519131] EXT4-fs (loop4): bad block size 16384 [ 1094.535536] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x10, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:53 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x3}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1094.554339] attempt to access beyond end of device [ 1094.599200] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1094.616700] loop5: rw=12288, want=12296, limit=20 [ 1094.670379] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1094.689582] attempt to access beyond end of device [ 1094.695819] EXT4-fs (loop1): Test dummy encryption mode enabled 03:45:53 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000000000100"}, &(0x7f0000000080)=0x1e) 03:45:53 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0xff00000000000000], [], @local}}}}, 0x90) [ 1094.744989] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1094.753377] gfs2: not a GFS2 filesystem [ 1094.755223] EXT4-fs (loop4): bad block size 16384 03:45:53 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010d00000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:53 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xf000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1094.789103] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1094.790082] loop5: rw=12288, want=8200, limit=20 [ 1094.828229] attempt to access beyond end of device [ 1094.834003] loop5: rw=12288, want=12296, limit=20 03:45:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000000000004000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000060c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:53 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x1000000], [], @local}}}}, 0x90) [ 1094.985520] gfs2: not a GFS2 filesystem [ 1095.006585] attempt to access beyond end of device 03:45:53 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x2000000], [], @local}}}}, 0x90) 03:45:53 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000600"}, &(0x7f0000000080)=0x1e) [ 1095.051016] loop5: rw=12288, want=8200, limit=20 [ 1095.062932] attempt to access beyond end of device [ 1095.070761] loop5: rw=12288, want=12296, limit=20 [ 1095.076952] attempt to access beyond end of device [ 1095.093244] loop5: rw=12288, want=8200, limit=20 03:45:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x68000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1095.098621] attempt to access beyond end of device [ 1095.104015] loop5: rw=12288, want=12296, limit=20 [ 1095.172837] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1095.179099] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1095.197083] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1095.268426] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1095.307255] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1095.316690] EXT4-fs (loop4): Invalid log cluster size: 4194304 03:45:54 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000b00000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:54 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa00}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:54 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) 03:45:54 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xff000000], [], @local}}}}, 0x90) [ 1095.350724] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1095.365987] gfs2: not a GFS2 filesystem [ 1095.382190] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1095.398423] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1095.400442] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:45:54 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000500"}, &(0x7f0000000080)=0x1e) 03:45:54 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x100000000000000], [], @local}}}}, 0x90) [ 1095.507796] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1095.509425] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:54 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000000000000600002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:54 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010003000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:54 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x200000000000000], [], @local}}}}, 0x90) 03:45:54 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4800, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff00000000e000c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:54 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000000000500"}, &(0x7f0000000080)=0x1e) 03:45:54 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000700000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1095.907330] EXT4-fs (loop4): Test dummy encryption mode enabled 03:45:54 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x1fffffe], [], @local}}}}, 0x90) [ 1095.962853] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1095.969669] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1096.000175] EXT4-fs (loop7): Test dummy encryption mode enabled 03:45:54 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x3f00000000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1096.030635] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1096.045637] EXT4-fs (loop4): Invalid log cluster size: 393216 [ 1096.070325] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:45:54 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000200"}, &(0x7f0000000080)=0x1e) 03:45:54 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x2], [], @local}}}}, 0x90) [ 1096.097328] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1096.143247] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1096.164261] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1096.198537] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1096.229413] EXT4-fs (loop4): Invalid log cluster size: 393216 03:45:54 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xff00], [], @local}}}}, 0x90) 03:45:54 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000480900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1096.314467] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1096.342220] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1096.349975] EXT4-fs (loop7): Test dummy encryption mode enabled 03:45:55 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008ffffff8c0000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1096.368084] gfs2: not a GFS2 filesystem [ 1096.380524] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1096.410526] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1096.425383] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:55 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xff00000000000000], [], @local}}}}, 0x90) [ 1096.452265] attempt to access beyond end of device [ 1096.463360] loop5: rw=12288, want=8200, limit=20 [ 1096.470832] attempt to access beyond end of device 03:45:55 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000300"}, &(0x7f0000000080)=0x1e) [ 1096.498402] loop5: rw=12288, want=12296, limit=20 [ 1096.515546] attempt to access beyond end of device [ 1096.540074] loop5: rw=12288, want=8200, limit=20 [ 1096.548197] attempt to access beyond end of device [ 1096.561997] loop5: rw=12288, want=12296, limit=20 [ 1096.676437] attempt to access beyond end of device 03:45:55 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec0000000107f2000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:55 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9effffff}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000a00c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:55 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6c00, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1096.701381] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1096.708976] loop5: rw=12288, want=8200, limit=20 [ 1096.754755] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1096.773680] attempt to access beyond end of device 03:45:55 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000300"}, &(0x7f0000000080)=0x1e) 03:45:55 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x40000000], [], @local}}}}, 0x90) [ 1096.824651] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (9240575 log_block_size) [ 1096.833068] loop5: rw=12288, want=12296, limit=20 [ 1096.892310] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1096.904967] attempt to access beyond end of device 03:45:55 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xf0}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1096.935349] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1096.974044] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1096.993736] loop5: rw=12288, want=8200, limit=20 [ 1097.000969] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1097.019266] attempt to access beyond end of device [ 1097.030570] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1097.043188] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1097.060108] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1097.070842] loop5: rw=12288, want=12296, limit=20 [ 1097.082872] gfs2: not a GFS2 filesystem 03:45:55 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x1000000], [], @local}}}}, 0x90) 03:45:55 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400300}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1097.127442] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (9240575 log_block_size) [ 1097.140887] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:55 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000500"}, &(0x7f0000000080)=0x1e) 03:45:55 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000030900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1097.236526] EXT4-fs (loop1): Test dummy encryption mode enabled 03:45:55 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffffd, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000040000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1097.284415] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1097.289119] EXT4-fs (loop7): Test dummy encryption mode enabled 03:45:56 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xfeffff01], [], @local}}}}, 0x90) [ 1097.327874] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1097.376401] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1097.420538] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1097.447640] attempt to access beyond end of device [ 1097.456016] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:56 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xd417}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1097.479040] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1097.487816] loop5: rw=12288, want=8200, limit=20 [ 1097.495867] attempt to access beyond end of device 03:45:56 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000200"}, &(0x7f0000000080)=0x1e) [ 1097.546745] loop5: rw=12288, want=12296, limit=20 [ 1097.586719] EXT4-fs (loop4): Invalid log block size: 262144 [ 1097.595091] f2fs_msg: 92 callbacks suppressed [ 1097.595102] F2FS-fs (loop5): Failed to get valid F2FS checkpoint 03:45:56 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000e000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000007a00c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:56 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x4000], [], @local}}}}, 0x90) 03:45:56 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) [ 1097.710032] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1097.716302] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1097.732356] gfs2: not a GFS2 filesystem [ 1097.747838] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:45:56 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xfeffff0100000000], [], @local}}}}, 0x90) 03:45:56 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xfffffff0}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1097.803197] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1097.811349] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1097.822182] attempt to access beyond end of device [ 1097.828092] EXT4-fs (loop4): Invalid log block size: 262144 [ 1097.874073] loop5: rw=12288, want=8200, limit=20 [ 1097.915476] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1097.940309] attempt to access beyond end of device [ 1097.945442] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1097.957759] loop5: rw=12288, want=12296, limit=20 03:45:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000004100000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1097.963728] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1097.972031] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:56 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6000000000000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:56 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) 03:45:56 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x4000000000000000], [], @local}}}}, 0x90) [ 1098.016744] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1098.020917] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 1098.097873] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1098.125643] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1098.153253] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1098.184721] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1098.193573] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1098.194816] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1098.222097] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1098.239905] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1098.244626] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1098.248826] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1098.271721] EXT4-fs (loop4): Invalid log block size: 1049600 [ 1098.336065] attempt to access beyond end of device [ 1098.352179] loop5: rw=12288, want=8200, limit=20 [ 1098.357311] attempt to access beyond end of device [ 1098.363039] loop5: rw=12288, want=12296, limit=20 [ 1098.368167] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 1098.377486] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1098.385391] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1098.393551] attempt to access beyond end of device [ 1098.398776] loop5: rw=12288, want=8200, limit=20 [ 1098.404032] attempt to access beyond end of device [ 1098.409308] loop5: rw=12288, want=12296, limit=20 [ 1098.415617] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 1098.456506] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1098.481237] gfs2: not a GFS2 filesystem 03:45:57 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000003600000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:57 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9effffff00000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:57 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x1fffffe], [], @local}}}}, 0x90) 03:45:57 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) 03:45:57 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010808000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000004c00c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1098.501724] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1098.509201] EXT4-fs (loop4): Invalid log block size: 1049600 03:45:57 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xff00000000000000], [], @local}}}}, 0x90) 03:45:57 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000000000400"}, &(0x7f0000000080)=0x1e) [ 1098.588572] EXT4-fs (loop7): Test dummy encryption mode enabled 03:45:57 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xa000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1098.649392] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1098.683599] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1098.690537] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:45:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008feffffff0000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1098.739959] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:57 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xff00], [], @local}}}}, 0x90) 03:45:57 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xf0ffffff00000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1098.810380] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:57 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) [ 1098.936781] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1098.955775] EXT4-fs (loop1): Test dummy encryption mode enabled 03:45:57 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000a00000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:57 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x40000000], [], @local}}}}, 0x90) 03:45:57 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010908000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1099.026818] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1099.096847] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1099.120567] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:57 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xf0ffffffffffff}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:57 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000ffffffff00"}, &(0x7f0000000080)=0x1e) [ 1099.201702] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (16777215 log_block_size) [ 1099.221981] gfs2: not a GFS2 filesystem 03:45:57 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x2000000], [], @local}}}}, 0x90) [ 1099.242651] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1099.271135] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:45:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000048c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1099.302423] EXT4-fs (loop4): Test dummy encryption mode enabled 03:45:58 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000100900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1099.343270] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1099.351008] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1099.395712] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (16777215 log_block_size) [ 1099.418720] attempt to access beyond end of device 03:45:58 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x4000], [], @local}}}}, 0x90) 03:45:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x600, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1099.496614] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1099.523190] loop5: rw=12288, want=8200, limit=20 03:45:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008070000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1099.541559] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1099.551587] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1099.559629] attempt to access beyond end of device [ 1099.584742] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:45:58 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) 03:45:58 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xfffff000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1099.593551] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1099.595553] loop5: rw=12288, want=12296, limit=20 [ 1099.605068] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1099.643165] attempt to access beyond end of device [ 1099.733062] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1099.746684] loop5: rw=12288, want=8200, limit=20 [ 1099.759704] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1099.770612] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:45:58 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x2], [], @local}}}}, 0x90) 03:45:58 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000011408000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1099.797609] attempt to access beyond end of device [ 1099.809990] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1099.826693] gfs2: not a GFS2 filesystem [ 1099.836398] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1099.860662] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1099.880028] loop5: rw=12288, want=12296, limit=20 03:45:58 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000100"}, &(0x7f0000000080)=0x1e) 03:45:58 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xffffff7f}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6c, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:45:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000005c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:58 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x100000000000000], [], @local}}}}, 0x90) [ 1100.049214] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1100.063150] EXT4-fs (loop7): Test dummy encryption mode enabled 03:45:58 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000005300000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1100.120581] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1100.143599] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1100.223787] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1100.236352] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1100.253624] EXT4-fs (loop1): Test dummy encryption mode enabled 03:45:58 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x200000000000000], [], @local}}}}, 0x90) 03:45:59 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x46612aeafc000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1100.294659] gfs2: not a GFS2 filesystem 03:45:59 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) [ 1100.340423] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1100.379879] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1100.393574] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1100.431011] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:45:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec0000000100082d0000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:59 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xfeffff01], [], @local}}}}, 0x90) [ 1100.492540] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1100.540368] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1100.551052] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1100.558532] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1100.597345] gfs2: not a GFS2 filesystem 03:45:59 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xf00000000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:59 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xfeffff0100000000], [], @local}}}}, 0x90) 03:45:59 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000300"}, &(0x7f0000000080)=0x1e) 03:45:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000006c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:59 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000c000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:59 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000140900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:45:59 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x100000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1100.722169] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1100.728353] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1100.745226] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:45:59 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x4000000000000000], [], @local}}}}, 0x90) [ 1100.877664] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1100.894200] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1100.902639] attempt to access beyond end of device [ 1100.924593] loop5: rw=12288, want=8200, limit=20 [ 1100.931705] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1100.947167] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1100.956693] attempt to access beyond end of device 03:45:59 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x3000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:59 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000000000600"}, &(0x7f0000000080)=0x1e) [ 1100.993835] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1101.020882] loop5: rw=12288, want=12296, limit=20 [ 1101.026098] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1101.050740] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1101.074634] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1101.081453] attempt to access beyond end of device [ 1101.094222] loop5: rw=12288, want=8200, limit=20 [ 1101.108876] attempt to access beyond end of device [ 1101.113308] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1101.119923] loop5: rw=12288, want=12296, limit=20 03:45:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000000000006000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:45:59 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x3f00}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:45:59 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x1000000], [], @local}}}}, 0x90) [ 1101.223455] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1101.232323] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1101.249073] gfs2: not a GFS2 filesystem [ 1101.250054] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1101.273588] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1101.286731] attempt to access beyond end of device [ 1101.287424] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1101.308944] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1101.325424] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1101.359473] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:00 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010608000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1101.380928] loop5: rw=12288, want=8200, limit=20 [ 1101.398542] EXT4-fs (loop4): Invalid log cluster size: 6291456 [ 1101.410328] attempt to access beyond end of device [ 1101.481069] loop5: rw=12288, want=12296, limit=20 03:46:00 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xff000000], [], @local}}}}, 0x90) [ 1101.511843] attempt to access beyond end of device 03:46:00 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) 03:46:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000500c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:00 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0x2000000c, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1101.593151] loop5: rw=12288, want=8200, limit=20 [ 1101.619420] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1101.619425] attempt to access beyond end of device [ 1101.619443] loop5: rw=12288, want=12296, limit=20 [ 1101.680325] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1101.680536] EXT4-fs (loop7): Test dummy encryption mode enabled 03:46:00 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffff8c, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:00 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffff01], [], @local}}}}, 0x90) 03:46:00 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000600"}, &(0x7f0000000080)=0x1e) [ 1101.729979] EXT4-fs (loop4): Invalid log cluster size: 6291456 [ 1101.769216] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1101.800027] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:00 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000050900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:00 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0x7ffff, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000000000000400002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1101.850325] EXT4-fs (loop1): Test dummy encryption mode enabled 03:46:00 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @local}}}}, 0x90) [ 1101.929914] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1101.937692] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1101.999695] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1102.011381] EXT4-fs (loop4): Test dummy encryption mode enabled 03:46:00 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x1fffffe], [], @local}}}}, 0x90) [ 1102.057797] attempt to access beyond end of device [ 1102.070137] loop5: rw=12288, want=8200, limit=20 [ 1102.077059] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1102.102322] attempt to access beyond end of device [ 1102.107475] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1102.123605] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:46:00 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0x18, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1102.148360] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1102.160772] loop5: rw=12288, want=12296, limit=20 [ 1102.170570] EXT4-fs (loop4): Invalid log cluster size: 262144 03:46:00 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000600"}, &(0x7f0000000080)=0x1e) [ 1102.200705] attempt to access beyond end of device [ 1102.219216] gfs2: not a GFS2 filesystem [ 1102.223713] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1102.252219] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1102.259891] loop5: rw=12288, want=8200, limit=20 [ 1102.269115] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1102.296326] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1102.317430] attempt to access beyond end of device [ 1102.330100] EXT4-fs (loop4): Invalid log cluster size: 262144 03:46:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000600c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1102.409301] loop5: rw=12288, want=12296, limit=20 03:46:01 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010053000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:01 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000], [], @local}}}}, 0x90) 03:46:01 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000000000300"}, &(0x7f0000000080)=0x1e) 03:46:01 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xb, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:01 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000], [], @local}}}}, 0x90) 03:46:01 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7400000000000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:01 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) 03:46:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008002300000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1102.576728] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1102.595703] attempt to access beyond end of device [ 1102.663298] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1102.690802] loop5: rw=12288, want=8200, limit=20 [ 1102.745681] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1102.749538] attempt to access beyond end of device [ 1102.791878] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1102.801586] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1102.810022] loop5: rw=12288, want=12296, limit=20 [ 1102.815374] f2fs_msg: 74 callbacks suppressed [ 1102.815383] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 1102.845515] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1102.861106] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1102.880119] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1102.898713] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1102.907773] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1102.919313] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1102.939354] EXT4-fs (loop4): Invalid log block size: 35 [ 1102.945239] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1102.958221] attempt to access beyond end of device [ 1102.981648] loop5: rw=12288, want=8200, limit=20 [ 1102.986613] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1103.002811] gfs2: not a GFS2 filesystem [ 1103.007168] attempt to access beyond end of device [ 1103.016338] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1103.030394] loop5: rw=12288, want=12296, limit=20 [ 1103.035995] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1103.055873] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 1103.070906] EXT4-fs (loop4): Invalid log block size: 35 03:46:01 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000680900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:01 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], [], @local}}}}, 0x90) 03:46:01 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000400"}, &(0x7f0000000080)=0x1e) 03:46:01 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0x25, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000900c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1103.123428] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1103.131654] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:46:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec0000000100080fff00000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:01 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000], [], @local}}}}, 0x90) [ 1103.245636] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1103.285678] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1103.286529] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:46:02 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000600"}, &(0x7f0000000080)=0x1e) [ 1103.324699] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1103.335740] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1103.343828] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1103.350250] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1103.415978] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (255 log_block_size) [ 1103.449308] attempt to access beyond end of device 03:46:02 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010012000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xff0f000000000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:02 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:02 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffff0100000000], [], @local}}}}, 0x90) [ 1103.457994] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1103.483811] loop5: rw=12288, want=8200, limit=20 [ 1103.528679] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1103.545029] attempt to access beyond end of device 03:46:02 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000300"}, &(0x7f0000000080)=0x1e) [ 1103.570258] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1103.579463] EXT4-fs (loop1): Test dummy encryption mode enabled 03:46:02 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:02 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000], [], @local}}}}, 0x90) 03:46:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008003f00000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1103.626690] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1103.627399] loop5: rw=12288, want=12296, limit=20 [ 1103.639735] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (255 log_block_size) [ 1103.644713] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1103.659991] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1103.676838] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1103.710156] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 1103.716749] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1103.726004] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1103.746343] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1103.780111] attempt to access beyond end of device [ 1103.787516] loop5: rw=12288, want=8200, limit=20 [ 1103.794643] attempt to access beyond end of device [ 1103.813996] loop5: rw=12288, want=12296, limit=20 [ 1103.833349] gfs2: not a GFS2 filesystem [ 1103.888762] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 1103.943651] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1103.982025] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1104.009975] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1104.019263] attempt to access beyond end of device [ 1104.044688] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1104.062119] loop5: rw=12288, want=8200, limit=20 [ 1104.066981] attempt to access beyond end of device [ 1104.078006] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1104.107102] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (63 log_block_size) [ 1104.130684] loop5: rw=12288, want=12296, limit=20 [ 1104.136150] attempt to access beyond end of device [ 1104.141373] loop5: rw=12288, want=8200, limit=20 [ 1104.146177] attempt to access beyond end of device [ 1104.151776] loop5: rw=12288, want=12296, limit=20 03:46:02 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000600900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000007400c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:02 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000], [], @local}}}}, 0x90) 03:46:02 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) 03:46:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfdffffff, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:02 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:02 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010005000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:02 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x4000], [], @local}}}}, 0x90) [ 1104.248813] EXT4-fs (loop1): Test dummy encryption mode enabled 03:46:03 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000300"}, &(0x7f0000000080)=0x1e) 03:46:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008230000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1104.350119] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1104.357660] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:03 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1104.393616] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1104.441542] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1104.445342] attempt to access beyond end of device [ 1104.471401] loop5: rw=12288, want=8200, limit=20 03:46:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000], [], @local}}}}, 0x90) [ 1104.498832] attempt to access beyond end of device [ 1104.518083] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1104.523213] loop5: rw=12288, want=12296, limit=20 [ 1104.553955] gfs2: not a GFS2 filesystem [ 1104.571274] EXT4-fs (loop4): Test dummy encryption mode enabled 03:46:03 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:03 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000500"}, &(0x7f0000000080)=0x1e) [ 1104.596247] attempt to access beyond end of device [ 1104.610199] loop5: rw=12288, want=8200, limit=20 [ 1104.615245] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1104.626821] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1104.634497] attempt to access beyond end of device [ 1104.681111] loop5: rw=12288, want=12296, limit=20 [ 1104.690610] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1104.706223] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1104.731547] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1104.775558] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1104.784558] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], [], @local}}}}, 0x90) 03:46:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8000000000000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1104.815965] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:03 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000003400000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff00000000000ac9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:03 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1104.991881] EXT4-fs (loop4): Test dummy encryption mode enabled 03:46:03 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000000000100"}, &(0x7f0000000080)=0x1e) [ 1105.066853] gfs2: not a GFS2 filesystem 03:46:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0xff00], [], @local}}}}, 0x90) [ 1105.093533] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:46:03 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010394000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1105.185972] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1105.187026] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:03 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffff01], [], @local}}}}, 0x90) [ 1105.253500] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:04 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000000ffffffff00"}, &(0x7f0000000080)=0x1e) 03:46:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008ebffffff0000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:04 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000d00000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x23000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1105.339501] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1105.344971] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1105.421235] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1105.470572] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1105.480457] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1105.500357] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:04 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1105.524527] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff00000000006cc9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1105.609111] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1105.628067] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1105.637105] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:04 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010011000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1105.812256] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1105.828938] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1105.843191] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1105.856243] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:46:04 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000], [], @local}}}}, 0x90) 03:46:04 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000000000300"}, &(0x7f0000000080)=0x1e) 03:46:04 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1105.890073] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (16777215 log_block_size) [ 1105.898574] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1105.913273] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1105.984058] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1106.021170] EXT4-fs (loop4): Test dummy encryption mode enabled 03:46:04 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000001100000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1106.028930] EXT4-fs (loop1): Test dummy encryption mode enabled 03:46:04 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00], [], @local}}}}, 0x90) [ 1106.075664] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1106.083957] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1106.103085] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:04 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1106.134878] gfs2: not a GFS2 filesystem 03:46:04 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000300"}, &(0x7f0000000080)=0x1e) [ 1106.171112] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (16777215 log_block_size) [ 1106.179981] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:04 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000], [], @local}}}}, 0x90) [ 1106.298011] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1106.313523] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:46:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000000000002100002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1106.370415] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:05 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c00000c0900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:05 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @local}}}}, 0x90) 03:46:05 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) 03:46:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000fffc9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:05 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:05 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000012d08000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:05 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffff0100000000], [], @local}}}}, 0x90) [ 1106.622998] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1106.656783] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1106.665317] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1106.687753] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1106.732014] attempt to access beyond end of device 03:46:05 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) [ 1106.760579] EXT4-fs (loop4): Invalid log cluster size: 2162688 [ 1106.815713] loop5: rw=12288, want=8200, limit=20 [ 1106.837457] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1106.850242] attempt to access beyond end of device [ 1106.858782] loop5: rw=12288, want=12296, limit=20 [ 1106.864110] gfs2: not a GFS2 filesystem [ 1106.893092] attempt to access beyond end of device [ 1106.905780] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1106.912188] EXT4-fs (loop7): Test dummy encryption mode enabled 03:46:05 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000], [], @local}}}}, 0x90) 03:46:05 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1106.940043] loop5: rw=12288, want=8200, limit=20 [ 1106.955192] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1106.956361] attempt to access beyond end of device [ 1106.985126] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1107.009703] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1107.010200] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1107.023864] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1107.047427] loop5: rw=12288, want=12296, limit=20 03:46:05 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000600"}, &(0x7f0000000080)=0x1e) [ 1107.076223] EXT4-fs (loop4): Invalid log cluster size: 2162688 [ 1107.093506] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6800, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:05 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], [], @local}}}}, 0x90) [ 1107.192776] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1107.193366] attempt to access beyond end of device [ 1107.232504] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:46:05 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008001fffff0000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff00000000002dc9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1107.297069] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1107.324541] loop5: rw=12288, want=8200, limit=20 [ 1107.337438] attempt to access beyond end of device [ 1107.380745] loop5: rw=12288, want=12296, limit=20 [ 1107.445702] attempt to access beyond end of device [ 1107.472963] loop5: rw=12288, want=8200, limit=20 [ 1107.484949] attempt to access beyond end of device [ 1107.497241] loop5: rw=12288, want=12296, limit=20 [ 1107.520270] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1107.548429] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1107.559887] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1107.576740] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1107.586823] gfs2: not a GFS2 filesystem 03:46:06 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000040900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:06 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) 03:46:06 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000], [], @local}}}}, 0x90) 03:46:06 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001002f000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:06 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1107.588317] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (16776991 log_block_size) [ 1107.602569] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:06 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], [], @local}}}}, 0x90) 03:46:06 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000200"}, &(0x7f0000000080)=0x1e) [ 1107.780064] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1107.819342] attempt to access beyond end of device 03:46:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000210000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff00000000e0ffc9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1107.830488] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1107.877716] loop5: rw=12288, want=8200, limit=20 [ 1107.888327] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:06 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1107.948026] attempt to access beyond end of device 03:46:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x68, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:06 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000], [], @local}}}}, 0x90) [ 1108.003088] loop5: rw=12288, want=12296, limit=20 [ 1108.020899] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1108.050771] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1108.060897] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1108.072440] f2fs_msg: 66 callbacks suppressed [ 1108.072452] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 1108.079931] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1108.091037] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1108.116948] EXT4-fs (loop4): Invalid log block size: 2162688 [ 1108.130338] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1108.145850] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1108.150226] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1108.157731] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1108.204246] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1108.223604] gfs2: not a GFS2 filesystem 03:46:06 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) [ 1108.260356] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1108.284572] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1108.294094] EXT4-fs (loop4): Invalid log block size: 2162688 03:46:07 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:07 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fffffe], [], @local}}}}, 0x90) [ 1108.312336] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1108.318790] attempt to access beyond end of device [ 1108.324090] loop5: rw=12288, want=8200, limit=20 [ 1108.329064] attempt to access beyond end of device [ 1108.340175] loop5: rw=12288, want=12296, limit=20 [ 1108.348885] F2FS-fs (loop5): Failed to get valid F2FS checkpoint 03:46:07 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010014000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1108.356662] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1108.372638] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1108.530897] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1108.538206] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1108.574635] attempt to access beyond end of device [ 1108.591578] loop5: rw=12288, want=8200, limit=20 [ 1108.597257] attempt to access beyond end of device [ 1108.611338] loop5: rw=12288, want=12296, limit=20 [ 1108.616435] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 1108.628940] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1108.648747] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1108.678367] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1108.687689] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1108.691574] attempt to access beyond end of device [ 1108.695561] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1108.706629] loop5: rw=12288, want=8200, limit=20 [ 1108.716013] attempt to access beyond end of device [ 1108.742498] loop5: rw=12288, want=12296, limit=20 [ 1108.762068] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 1108.770509] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1108.776595] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:46:07 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c00004c0900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec0000000100080000fc000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x101161970, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:07 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000], [], @local}}}}, 0x90) 03:46:07 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000200"}, &(0x7f0000000080)=0x1e) 03:46:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff00000000007ac9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:07 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1108.798507] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:07 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000], [], @local}}}}, 0x90) [ 1108.903405] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1108.915083] EXT4-fs (loop4): Test dummy encryption mode enabled 03:46:07 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffff0100000000], [], @local}}}}, 0x90) [ 1108.976665] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1108.985397] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1108.986104] attempt to access beyond end of device 03:46:07 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000b000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:07 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:07 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000000000600"}, &(0x7f0000000080)=0x1e) [ 1109.029365] loop5: rw=12288, want=8200, limit=20 [ 1109.037887] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1109.064392] attempt to access beyond end of device [ 1109.069595] gfs2: not a GFS2 filesystem [ 1109.095246] EXT4-fs (loop4): Invalid log block size: 64512 [ 1109.097032] loop5: rw=12288, want=12296, limit=20 [ 1109.152875] attempt to access beyond end of device [ 1109.188612] loop5: rw=12288, want=8200, limit=20 03:46:07 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000], [], @local}}}}, 0x90) [ 1109.213728] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1109.238403] attempt to access beyond end of device [ 1109.238637] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1109.263375] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1109.287088] loop5: rw=12288, want=12296, limit=20 [ 1109.293633] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x23, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1109.315916] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:46:08 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1109.362664] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1109.371437] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:46:08 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000], [], @local}}}}, 0x90) [ 1109.410975] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1109.439718] EXT4-fs (loop4): Invalid log block size: 64512 [ 1109.470246] attempt to access beyond end of device [ 1109.507538] loop5: rw=12288, want=8200, limit=20 [ 1109.557165] attempt to access beyond end of device [ 1109.603313] loop5: rw=12288, want=12296, limit=20 [ 1109.619710] attempt to access beyond end of device [ 1109.644668] gfs2: not a GFS2 filesystem [ 1109.658588] loop5: rw=12288, want=8200, limit=20 [ 1109.687640] attempt to access beyond end of device [ 1109.700471] loop5: rw=12288, want=12296, limit=20 03:46:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000074c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:08 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000400"}, &(0x7f0000000080)=0x1e) 03:46:08 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffff01], [], @local}}}}, 0x90) 03:46:08 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000c00000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:08 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000016008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:08 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000020000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1109.737858] gfs2: not a GFS2 filesystem 03:46:08 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000], [], @local}}}}, 0x90) 03:46:08 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000500"}, &(0x7f0000000080)=0x1e) [ 1109.887323] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1109.913992] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1109.923217] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1109.923583] EXT4-fs (loop7): Test dummy encryption mode enabled 03:46:08 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1109.980020] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1110.003995] EXT4-fs (loop4): Invalid log block size: 131072 03:46:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x10000000000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1110.028135] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1110.045772] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:46:08 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000], [], @local}}}}, 0x90) [ 1110.086667] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:08 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000400"}, &(0x7f0000000080)=0x1e) [ 1110.162219] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1110.171347] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1110.177438] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:08 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c000003de00000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1110.219161] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1110.267947] EXT4-fs (loop4): Invalid log block size: 131072 [ 1110.274670] EXT4-fs (loop7): Test dummy encryption mode enabled 03:46:09 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000], [], @local}}}}, 0x90) 03:46:09 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) [ 1110.346134] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1110.357664] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1110.460648] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1110.494361] gfs2: not a GFS2 filesystem 03:46:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000700c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:09 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008002100000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:09 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], [], @local}}}}, 0x90) 03:46:09 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000c00000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:09 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000000000400"}, &(0x7f0000000080)=0x1e) 03:46:09 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010094030000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:09 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000000000500"}, &(0x7f0000000080)=0x1e) 03:46:09 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000], [], @local}}}}, 0x90) [ 1110.803452] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1110.809575] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1110.824403] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1110.845819] EXT4-fs (loop1): Test dummy encryption mode enabled 03:46:09 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x40000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:09 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000d00000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1110.924631] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1110.946241] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1111.005921] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1111.038234] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:09 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00], [], @local}}}}, 0x90) [ 1111.070042] EXT4-fs (loop4): Invalid log block size: 33 [ 1111.133568] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1111.139985] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1111.148471] EXT4-fs (loop4): Invalid log block size: 33 03:46:09 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000d000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:09 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000600"}, &(0x7f0000000080)=0x1e) 03:46:09 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1111.180335] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1111.210932] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1111.288521] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1111.401347] EXT4-fs (loop7): Test dummy encryption mode enabled 03:46:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec0000000100080a0000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:10 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000], [], @local}}}}, 0x90) 03:46:10 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000001100000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:10 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) 03:46:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000006000c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:10 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1111.442335] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1111.468751] gfs2: not a GFS2 filesystem 03:46:10 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @local}}}}, 0x90) [ 1111.540178] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1111.593432] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1111.610970] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:46:10 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000100"}, &(0x7f0000000080)=0x1e) [ 1111.652896] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1111.659000] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1111.710385] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1111.746674] EXT4-fs (loop1): Test dummy encryption mode enabled 03:46:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xa, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:10 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fffffe], [], @local}}}}, 0x90) 03:46:10 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:10 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) [ 1111.815388] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1111.836015] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:10 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000e00000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1111.924873] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1111.937850] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1111.949179] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1112.035624] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1112.077143] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1112.113368] gfs2: not a GFS2 filesystem 03:46:10 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010014000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:10 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], [], @local}}}}, 0x90) 03:46:10 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1112.131818] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1112.145162] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:10 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) 03:46:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000800000000fffffffe00002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:10 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @local}}}}, 0x90) 03:46:11 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000001000000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000004800c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:11 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1112.439544] EXT4-fs (loop7): Test dummy encryption mode enabled 03:46:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8cffffff, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:11 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:11 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000000000200"}, &(0x7f0000000080)=0x1e) 03:46:11 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffff0100000000], [], @local}}}}, 0x90) [ 1112.530899] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:46:11 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000001200000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1112.587432] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1112.623186] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1112.625393] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1112.652420] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:11 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000], [], @local}}}}, 0x90) [ 1112.696745] EXT4-fs (loop7): Test dummy encryption mode enabled 03:46:11 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1112.758724] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1112.810805] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1112.818802] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1112.832886] EXT4-fs (loop4): Invalid log block size: 4278190080 [ 1112.839234] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1112.956306] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1112.960608] gfs2: not a GFS2 filesystem [ 1112.969897] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1112.977472] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:11 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010000070000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:11 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000500"}, &(0x7f0000000080)=0x1e) 03:46:11 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000800000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:11 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], [], @local}}}}, 0x90) [ 1113.027345] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1113.047455] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1113.069439] EXT4-fs (loop4): Invalid log block size: 4278190080 03:46:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000000000000200002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:11 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff00000000001fc9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:11 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) [ 1113.192413] f2fs_msg: 124 callbacks suppressed [ 1113.192429] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1113.223360] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1113.267415] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1113.280904] F2FS-fs (loop5): Invalid log blocks per segment (8) [ 1113.280904] [ 1113.334746] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1113.349276] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1113.373526] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock 03:46:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffdfc, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:12 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1113.391263] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1113.402708] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1113.414817] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1113.414838] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:46:12 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) [ 1113.489664] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1113.498511] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1113.500784] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1113.508333] EXT4-fs (loop4): Invalid log cluster size: 131072 03:46:12 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000], [], @local}}}}, 0x90) [ 1113.580406] F2FS-fs (loop5): Invalid log blocks per segment (8) [ 1113.580406] [ 1113.614608] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1113.636032] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1113.654276] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock 03:46:12 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001002d000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1113.696963] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1113.710424] EXT4-fs (loop4): Invalid log cluster size: 131072 [ 1113.721167] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:12 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000300"}, &(0x7f0000000080)=0x1e) 03:46:12 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000], [], @local}}}}, 0x90) [ 1113.800067] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1113.816723] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1113.837552] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1113.850105] gfs2: not a GFS2 filesystem [ 1113.862170] EXT4-fs (loop7): Test dummy encryption mode enabled 03:46:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000060000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:12 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1113.891760] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:46:12 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000600000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:12 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) [ 1113.958111] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xa00000000000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000020c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:12 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], [], @local}}}}, 0x90) [ 1114.130371] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1114.141247] EXT4-fs (loop4): Test dummy encryption mode enabled 03:46:12 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:12 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000200"}, &(0x7f0000000080)=0x1e) [ 1114.183200] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1114.193066] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1114.232617] EXT4-fs (loop4): Invalid log block size: 393216 [ 1114.240486] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:12 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000], [], @local}}}}, 0x90) [ 1114.345176] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1114.384150] EXT4-fs (loop4): Test dummy encryption mode enabled 03:46:13 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000001400000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:13 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010009000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1114.416652] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1114.433469] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:46:13 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffff01], [], @local}}}}, 0x90) [ 1114.488088] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1114.500588] EXT4-fs (loop4): Invalid log block size: 393216 03:46:13 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:13 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000500"}, &(0x7f0000000080)=0x1e) 03:46:13 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000], [], @local}}}}, 0x90) 03:46:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec0000000100080000000a0000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1114.655860] gfs2: not a GFS2 filesystem 03:46:13 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:13 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000004e00000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000023c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1114.821028] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1114.850734] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1114.863164] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:46:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4c00000000000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:13 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000000000000000600"}, &(0x7f0000000080)=0x1e) 03:46:13 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fffffe], [], @local}}}}, 0x90) [ 1114.920086] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1114.928619] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1114.959632] EXT4-fs (loop4): Invalid log block size: 655360 [ 1115.057384] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1115.070051] EXT4-fs (loop1): Test dummy encryption mode enabled 03:46:13 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000500000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:13 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000000000000000200"}, &(0x7f0000000080)=0x1e) [ 1115.100357] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1115.120217] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:13 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000], [], @local}}}}, 0x90) [ 1115.148647] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:13 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1115.210820] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:14 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010011000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008006000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:14 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000300"}, &(0x7f0000000080)=0x1e) [ 1115.368124] gfs2: not a GFS2 filesystem [ 1115.379388] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1115.395646] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1115.402156] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:14 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000], [], @local}}}}, 0x90) [ 1115.434978] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1115.443508] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:14 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000003400000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1115.508336] EXT4-fs (loop4): Invalid log block size: 96 03:46:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000c7cc9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:14 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000500"}, &(0x7f0000000080)=0x1e) 03:46:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf801000000000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:14 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1115.606033] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1115.645171] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:46:14 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00], [], @local}}}}, 0x90) 03:46:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000300000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1115.740700] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1115.819307] EXT4-fs (loop1): Test dummy encryption mode enabled 03:46:14 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) 03:46:14 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @local}}}}, 0x90) [ 1115.880527] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1115.892593] EXT4-fs (loop7): Test dummy encryption mode enabled 03:46:14 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c000000de03000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1115.938062] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1115.948684] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1115.965399] EXT4-fs (loop4): Test dummy encryption mode enabled 03:46:14 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1116.026651] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1116.040179] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1116.113980] EXT4-fs (loop4): bad block size 8192 03:46:14 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000000000000000500"}, &(0x7f0000000080)=0x1e) 03:46:14 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec0000000100000d0000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000002d00c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:14 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000], [], @local}}}}, 0x90) [ 1116.215629] gfs2: not a GFS2 filesystem [ 1116.253729] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1116.275965] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:46:15 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffff0100000000], [], @local}}}}, 0x90) [ 1116.335680] EXT4-fs (loop4): bad block size 8192 03:46:15 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:15 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000400"}, &(0x7f0000000080)=0x1e) 03:46:15 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000a00000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1116.467461] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1116.476836] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1116.521419] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec0000000100080000003f0000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:15 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffff01], [], @local}}}}, 0x90) [ 1116.564771] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1116.592118] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1116.602855] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:15 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:15 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000500"}, &(0x7f0000000080)=0x1e) [ 1116.765423] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1116.777447] EXT4-fs (loop7): Test dummy encryption mode enabled 03:46:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff00000000000ac9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:15 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], [], @local}}}}, 0x90) [ 1116.851529] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1116.867340] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1116.867991] gfs2: not a GFS2 filesystem [ 1116.919912] EXT4-fs (loop4): Invalid log block size: 4128768 03:46:15 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:15 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000b00000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1116.968865] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1117.049587] gfs2: not a GFS2 filesystem [ 1117.070218] EXT4-fs (loop4): Test dummy encryption mode enabled 03:46:15 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010007000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:15 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000600"}, &(0x7f0000000080)=0x1e) 03:46:15 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000], [], @local}}}}, 0x90) 03:46:15 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1117.114842] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1117.135876] EXT4-fs (loop4): Invalid log block size: 4128768 03:46:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffdfd, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1117.192341] EXT4-fs (loop1): Test dummy encryption mode enabled 03:46:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000400000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:16 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00], [], @local}}}}, 0x90) [ 1117.305086] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1117.338666] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1117.341592] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1117.370244] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1117.421018] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:16 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000005300000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:16 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0x7ffff000, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1117.548671] EXT4-fs (loop4): Test dummy encryption mode enabled 03:46:16 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) [ 1117.591458] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1117.628357] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1117.646189] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1117.672804] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1117.681437] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1117.699378] EXT4-fs (loop4): Invalid log block size: 4194304 [ 1117.715124] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1117.737859] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:16 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000], [], @local}}}}, 0x90) [ 1117.766690] gfs2: not a GFS2 filesystem 03:46:16 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000b000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000008c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:16 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000100"}, &(0x7f0000000080)=0x1e) 03:46:16 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0x2c0, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:16 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000700000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:16 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000], [], @local}}}}, 0x90) 03:46:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008f6ffffff0000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:16 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000400"}, &(0x7f0000000080)=0x1e) 03:46:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xebffffff00000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:16 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1118.120634] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1118.124903] EXT4-fs (loop7): Test dummy encryption mode enabled 03:46:16 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000], [], @local}}}}, 0x90) [ 1118.221704] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1118.252764] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1118.322143] f2fs_msg: 126 callbacks suppressed [ 1118.322156] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1118.347496] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1118.383382] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1118.391258] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1118.400259] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1118.419999] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000], [], @local}}}}, 0x90) [ 1118.420926] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (16777215 log_block_size) 03:46:17 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xec0, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:17 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) [ 1118.468841] F2FS-fs (loop5): Invalid log blocks per segment (7) [ 1118.468841] [ 1118.513038] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1118.520479] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1118.532025] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1118.549882] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock 03:46:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fffffe], [], @local}}}}, 0x90) [ 1118.588163] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1118.605095] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1118.608636] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1118.622705] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1118.658870] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1118.681832] gfs2: not a GFS2 filesystem [ 1118.690623] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1118.691531] F2FS-fs (loop5): Invalid log blocks per segment (7) [ 1118.691531] 03:46:17 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) [ 1118.739284] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1118.754399] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (16777215 log_block_size) [ 1118.859939] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock 03:46:17 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001002f000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000009c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:17 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xfffffdef, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000], [], @local}}}}, 0x90) 03:46:17 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000300000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:17 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000200"}, &(0x7f0000000080)=0x1e) 03:46:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000000000008000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], [], @local}}}}, 0x90) 03:46:17 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0x20000538, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1119.060148] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1119.066262] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1119.169214] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1119.179908] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1119.187721] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:17 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000600"}, &(0x7f0000000080)=0x1e) [ 1119.231436] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:18 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0x33fe0, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}, 0xff000000}}}, 0x90) [ 1119.308308] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1119.316852] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1119.327896] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1119.357556] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1119.374583] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1119.401906] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1119.426448] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1119.442942] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:18 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000300"}, &(0x7f0000000080)=0x1e) 03:46:18 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0xf, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1119.460049] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1119.486032] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1119.500327] EXT4-fs (loop4): Invalid log cluster size: 8388608 [ 1119.520958] gfs2: not a GFS2 filesystem 03:46:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}, 0xfeffff01}}}, 0x90) [ 1119.640770] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1119.647707] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1119.655618] EXT4-fs (loop4): Invalid log cluster size: 8388608 03:46:18 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) 03:46:18 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010004000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000048c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000800000000001fffff00002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1119.886806] EXT4-fs (loop7): Test dummy encryption mode enabled 03:46:18 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x26, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}, 0x2}}}, 0x90) 03:46:18 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000200000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf6ffffff00000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1119.930776] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1119.940276] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1119.983690] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1119.987684] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1119.999462] netlink: 232 bytes leftover after parsing attributes in process `syz-executor0'. [ 1120.008953] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:46:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}, 0xff00000000000000}}}, 0x90) 03:46:18 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000000000000000100"}, &(0x7f0000000080)=0x1e) [ 1120.039653] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1120.054181] EXT4-fs (loop4): Invalid log cluster size: 16776991 [ 1120.091348] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1120.156724] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1120.171814] EXT4-fs (loop4): Test dummy encryption mode enabled 03:46:18 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x17d4, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1120.203747] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1120.220154] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:46:18 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000000000000000400"}, &(0x7f0000000080)=0x1e) 03:46:18 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000003600000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000006c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1120.279017] EXT4-fs (loop4): Invalid log cluster size: 16776991 [ 1120.299806] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:19 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}, 0x40000000}}}, 0x90) [ 1120.397523] gfs2: not a GFS2 filesystem 03:46:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000800000000c0ed000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:19 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000000ffffffff00"}, &(0x7f0000000080)=0x1e) 03:46:19 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010021000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1120.527126] EXT4-fs (loop1): Test dummy encryption mode enabled 03:46:19 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}, 0x1fffffe}}}, 0x90) 03:46:19 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x40030000000000, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1000000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1120.589714] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1120.641134] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1120.713094] EXT4-fs (loop4): Test dummy encryption mode enabled 03:46:19 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000400000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1120.767276] EXT4-fs (loop1): Test dummy encryption mode enabled 03:46:19 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0xf000, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1120.808949] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1120.835435] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1120.849677] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1120.862741] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1120.863152] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1120.890930] EXT4-fs (loop4): Invalid log block size: 3221225472 03:46:19 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000000000000000300"}, &(0x7f0000000080)=0x1e) 03:46:19 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}, 0x4000000000000000}}}, 0x90) [ 1120.925259] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:19 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0xf00, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff00000000004cc9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1121.080658] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1121.115880] gfs2: not a GFS2 filesystem [ 1121.121686] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1121.164113] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:46:19 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900000063000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:19 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}, 0x2000000}}}, 0x90) [ 1121.260012] EXT4-fs (loop4): Invalid log block size: 3221225472 [ 1121.262005] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1121.273320] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1121.339154] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1121.377041] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:20 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) 03:46:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x900000000000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1121.388761] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008c0ed00000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:20 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0xf0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:20 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010053000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:20 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}, 0x100000000000000}}}, 0x90) 03:46:20 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) 03:46:20 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x2, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:20 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900000009000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:20 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}, 0xfeffff0100000000}}}, 0x90) [ 1121.698554] EXT4-fs (loop4): Test dummy encryption mode enabled 03:46:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000074c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1121.760593] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1121.787496] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1121.845733] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1121.860267] EXT4-fs (loop4): Unsupported filesystem blocksize 8388608 (237 log_block_size) 03:46:20 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) [ 1121.900573] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1121.939744] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:20 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}, 0xff00}}}, 0x90) [ 1121.952594] gfs2: not a GFS2 filesystem [ 1121.962919] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:20 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0xffffff9e, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1122.007253] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000000000fc0000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1122.084996] EXT4-fs (loop7): Test dummy encryption mode enabled 03:46:20 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000600"}, &(0x7f0000000080)=0x1e) [ 1122.151447] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1122.158940] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:20 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900000036000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x200000000000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:20 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}, 0x200000000000000}}}, 0x90) [ 1122.254180] EXT4-fs (loop4): Test dummy encryption mode enabled 03:46:21 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0xf0ffffff00000000, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1122.321710] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:46:21 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000000000000000300"}, &(0x7f0000000080)=0x1e) 03:46:21 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}, 0x1000000}}}, 0x90) 03:46:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000003c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:21 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000fff0000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1122.418792] EXT4-fs (loop4): Invalid log cluster size: 64512 03:46:21 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}, 0x4000}}}, 0x90) [ 1122.556164] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1122.574056] EXT4-fs (loop1): Test dummy encryption mode enabled 03:46:21 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000972020001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1122.613983] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1122.623486] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:21 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000000000000000500"}, &(0x7f0000000080)=0x1e) [ 1122.665995] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1122.690191] gfs2: not a GFS2 filesystem [ 1122.712248] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:21 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x300, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:21 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1122.740509] EXT4-fs (loop4): Invalid log cluster size: 64512 [ 1122.751271] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1122.825898] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1122.871926] EXT4-fs (loop1): Test dummy encryption mode enabled 03:46:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec0000000100080000002d0000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1122.915785] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:21 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000000000000000600"}, &(0x7f0000000080)=0x1e) 03:46:21 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900740001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1122.988843] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:21 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1123.041782] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1123.072423] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:46:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x300, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:21 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x9effffff, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1123.141022] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:21 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:46:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000014c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1123.188252] EXT4-fs (loop4): Test dummy encryption mode enabled 03:46:21 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) [ 1123.235911] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1123.246282] EXT4-fs (loop4): Invalid log block size: 2949120 03:46:22 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:46:22 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0xffffff7f, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:22 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000c000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:22 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000974c858df000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1123.387331] gfs2: not a GFS2 filesystem [ 1123.421246] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1123.427775] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1123.444828] EXT4-fs (loop4): Invalid log block size: 2949120 03:46:22 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000500"}, &(0x7f0000000080)=0x1e) [ 1123.498036] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1123.500807] f2fs_msg: 118 callbacks suppressed [ 1123.500821] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:46:22 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1123.545640] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1123.573602] gfs2: not a GFS2 filesystem 03:46:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008f5ffffff0000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1123.651812] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1123.655575] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1123.685482] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1123.689897] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock 03:46:22 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x34000, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:22 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:46:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:22 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000500"}, &(0x7f0000000080)=0x1e) [ 1123.743258] F2FS-fs (loop5): Invalid log blocks per segment (1489531913) [ 1123.743258] [ 1123.765842] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock [ 1123.780840] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1123.814875] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1123.826564] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1123.836197] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1123.870487] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1123.880998] F2FS-fs (loop5): Invalid log blocks per segment (1489531913) [ 1123.880998] [ 1123.910112] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1123.919858] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock [ 1123.950593] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1123.973332] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1123.998067] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (16777215 log_block_size) 03:46:22 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:46:22 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) 03:46:22 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0xfffffff0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1124.041533] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1124.046061] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1124.065996] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1124.128394] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:46:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000004c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:22 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000000000200"}, &(0x7f0000000080)=0x1e) 03:46:22 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:46:22 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900000010000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1124.263134] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1124.375337] gfs2: not a GFS2 filesystem 03:46:23 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010005000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:23 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0xf, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000000000000900002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1124.412476] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1124.429480] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:23 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000400"}, &(0x7f0000000080)=0x1e) [ 1124.493412] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1124.500046] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1124.521222] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:46:23 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1124.562987] EXT4-fs (loop4): Invalid log cluster size: 589824 03:46:23 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000200"}, &(0x7f0000000080)=0x1e) 03:46:23 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x74000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:23 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x100000000000000, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1124.651715] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1124.657999] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1124.680658] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:46:23 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c000000090000003f000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:23 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1124.734348] EXT4-fs (loop4): Invalid log cluster size: 589824 [ 1124.740963] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:46:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff00000000002dc9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1124.819158] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:23 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0xf00000000000000, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000007fffffff00002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1124.965283] EXT4-fs (loop7): Test dummy encryption mode enabled 03:46:23 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) 03:46:23 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1125.058404] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1125.123741] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1125.150781] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1125.160648] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1125.169931] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:23 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c00000009fe010001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1125.197558] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1125.222344] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1125.252471] gfs2: not a GFS2 filesystem [ 1125.283111] EXT4-fs (loop4): Invalid log block size: 2130706432 03:46:24 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000a000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:46:24 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000000000100"}, &(0x7f0000000080)=0x1e) 03:46:24 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0xfffff000, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1125.406508] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1125.450022] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1125.481621] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1125.510268] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1125.532696] EXT4-fs (loop4): Invalid log block size: 2130706432 03:46:24 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1125.580028] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:46:24 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000600"}, &(0x7f0000000080)=0x1e) 03:46:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000000000040000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000068c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:24 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x1000000, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:24 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000902000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1125.793526] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1125.824679] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1125.861353] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:24 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) 03:46:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1125.990325] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1126.011509] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1126.058199] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1126.065473] gfs2: not a GFS2 filesystem [ 1126.068936] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1126.077961] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1126.083469] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1126.086063] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1126.102418] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:24 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0xa00, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:24 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c00000009ffffff1f000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1126.170123] EXT4-fs (loop4): Invalid log cluster size: 1024 03:46:25 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010043000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:25 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) 03:46:25 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:46:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x97ffffff, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000002c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:25 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0xa, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000800000000ffffff8c00002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:25 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000000000600"}, &(0x7f0000000080)=0x1e) [ 1126.581912] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1126.625921] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1126.654405] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:46:25 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900000034000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1126.686165] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1126.701153] EXT4-fs (loop4): Test dummy encryption mode enabled 03:46:25 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:46:25 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) [ 1126.735746] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1126.753675] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1126.760463] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:25 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x300000000000000, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1126.795179] EXT4-fs (loop4): Invalid log block size: 4278190080 [ 1126.874489] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1126.899312] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1126.913173] gfs2: not a GFS2 filesystem 03:46:25 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1126.944022] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1126.946791] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1126.992231] EXT4-fs (loop4): Invalid log block size: 4278190080 [ 1126.992846] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:25 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c00000009000021dd000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:25 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x46612aeafc000000, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1127.083421] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1127.121817] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:25 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1127.184575] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000800fc00000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf5ffffff, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:25 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000e000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:25 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000000000400"}, &(0x7f0000000080)=0x1e) 03:46:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000021c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:46:26 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) [ 1127.417340] EXT4-fs (loop4): Test dummy encryption mode enabled 03:46:26 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c000000090000000a000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:26 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x2000000, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1127.480455] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1127.491327] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1127.526479] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (252 log_block_size) 03:46:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1127.583588] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1127.588524] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1127.600562] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1127.651566] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1127.676232] gfs2: not a GFS2 filesystem 03:46:26 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) 03:46:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:46:26 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:26 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x400300, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1127.715534] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1127.735061] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1127.747016] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1127.757788] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1127.848039] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1127.861736] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (252 log_block_size) [ 1127.905386] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:26 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900000427000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff00000000006cc9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000600000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:46:26 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010003000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:26 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000300"}, &(0x7f0000000080)=0x1e) 03:46:26 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x3000000, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1128.233575] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1128.257219] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1128.273830] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:27 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1128.310863] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1128.329007] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1128.346344] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1128.384865] gfs2: not a GFS2 filesystem [ 1128.387649] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:46:27 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000000000500"}, &(0x7f0000000080)=0x1e) [ 1128.425135] EXT4-fs (loop4): Invalid log block size: 6291456 03:46:27 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1128.472799] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1128.479064] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1128.479127] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:27 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c00000009dd210001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:27 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0xfcea2a6146, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1128.567519] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1128.612262] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1128.620526] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1128.665281] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1128.677980] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:46:27 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000000000000000100"}, &(0x7f0000000080)=0x1e) [ 1128.708927] EXT4-fs (loop4): Invalid log block size: 6291456 [ 1128.729134] f2fs_msg: 126 callbacks suppressed [ 1128.729146] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:46:27 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xe00, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:27 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1128.760022] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:27 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0xf0ffffffffffff, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000023c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008fc0000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1128.807106] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1128.829714] F2FS-fs (loop5): Invalid log blocks per segment (2219273) [ 1128.829714] [ 1128.838974] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock [ 1128.847411] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:46:27 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010000001000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1128.857274] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1128.874733] F2FS-fs (loop5): Invalid log blocks per segment (2219273) [ 1128.874733] [ 1128.893755] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock 03:46:27 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1129.024191] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1129.035058] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1129.054647] EXT4-fs (loop4): Test dummy encryption mode enabled 03:46:27 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000300"}, &(0x7f0000000080)=0x1e) [ 1129.091195] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1129.101973] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock 03:46:27 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0xf0ffff, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1129.157843] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1129.170284] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:27 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1129.216424] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1129.228800] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1129.246893] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:46:27 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000921dd0001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1129.288021] EXT4-fs (loop7): Unsupported filesystem blocksize 67108864 (16 log_block_size) [ 1129.363138] gfs2: not a GFS2 filesystem [ 1129.378987] EXT4-fs (loop1): Test dummy encryption mode enabled 03:46:28 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}, 0xff00000000000000}, 0x90) 03:46:28 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0xd417, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1129.458716] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1129.474487] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:28 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000000ffffffff00"}, &(0x7f0000000080)=0x1e) [ 1129.516661] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1129.550240] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:28 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900030001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:28 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3f00000000000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1129.560166] EXT4-fs (loop7): Unsupported filesystem blocksize 67108864 (16 log_block_size) 03:46:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000600000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:28 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}, 0x4000000000000000}, 0x90) 03:46:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000005c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:28 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000000000300"}, &(0x7f0000000080)=0x1e) 03:46:28 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x9effffff00000000, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:28 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010062000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:28 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}, 0x4000}, 0x90) 03:46:28 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000948000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1129.909796] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1129.960394] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1129.967905] EXT4-fs (loop4): bad block size 65536 [ 1130.019206] gfs2: not a GFS2 filesystem [ 1130.027645] EXT4-fs (loop1): Test dummy encryption mode enabled 03:46:28 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}, 0xff00}, 0x90) [ 1130.072498] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1130.079706] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1130.096957] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:28 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000600"}, &(0x7f0000000080)=0x1e) 03:46:28 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x3f00000000000000, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1130.148004] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1130.190842] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1130.205331] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1130.225853] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1130.234286] EXT4-fs (loop4): bad block size 65536 03:46:28 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}, 0x100000000000000}, 0x90) 03:46:28 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000968000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:29 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffff7f, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000a00000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:29 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0xf0ffffff, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1130.373019] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1130.383511] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:29 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) [ 1130.486879] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:29 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}, 0x200000000000000}, 0x90) 03:46:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff0000000000e0c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:29 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010006000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:29 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x3f000000, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1130.676491] EXT4-fs (loop4): Test dummy encryption mode enabled 03:46:29 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000000000000000400"}, &(0x7f0000000080)=0x1e) [ 1130.729538] gfs2: not a GFS2 filesystem 03:46:29 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}, 0xfeffff0100000000}, 0x90) 03:46:29 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900200001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1130.761427] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1130.813948] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1130.839893] EXT4-fs (loop4): Unsupported filesystem blocksize 1048576 (10 log_block_size) [ 1130.895897] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1130.928397] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1130.950541] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1130.971220] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:29 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}, 0x1000000}, 0x90) 03:46:29 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0xa000000, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:29 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000000000000000200"}, &(0x7f0000000080)=0x1e) [ 1131.004412] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:29 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900000008000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1131.084443] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1131.121240] EXT4-fs (loop7): Test dummy encryption mode enabled 03:46:29 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xedc0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1131.146285] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1131.160702] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1131.223251] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1131.259380] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:29 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) [ 1131.268484] EXT4-fs (loop4): Unsupported filesystem blocksize 1048576 (10 log_block_size) [ 1131.282866] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1131.337396] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:30 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}, 0x2000000}, 0x90) 03:46:30 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x3f00, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec0000000100088cffffff0000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:30 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec0000000100f2070000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:30 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000200"}, &(0x7f0000000080)=0x1e) 03:46:30 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}, 0xfeffff01}, 0x90) 03:46:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000007c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:30 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c00000009000003a1000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:30 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0xfffffffffffff000, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1131.634267] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1131.656059] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1131.659936] gfs2: not a GFS2 filesystem [ 1131.665660] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1131.705034] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1131.742748] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1131.767336] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:46:30 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}, 0xff000000}, 0x90) [ 1131.815936] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1131.853782] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (16777215 log_block_size) 03:46:30 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xff0f, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1131.903750] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:30 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) 03:46:30 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c000000090a000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:30 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0xffffff7f00000000, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1132.006025] EXT4-fs (loop4): Test dummy encryption mode enabled 03:46:30 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010012000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1132.046436] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1132.069087] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:46:30 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}, 0x2}, 0x90) 03:46:30 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000000000400"}, &(0x7f0000000080)=0x1e) [ 1132.115886] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (16777215 log_block_size) [ 1132.140233] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1132.229150] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:30 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}, 0x1fffffe}, 0x90) 03:46:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008040000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:31 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900090001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1132.310446] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1132.347205] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:46:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000060c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:31 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) 03:46:31 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0xd417000000000000, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1132.369852] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1132.481569] gfs2: not a GFS2 filesystem [ 1132.576051] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1132.592156] EXT4-fs (loop1): Test dummy encryption mode enabled 03:46:31 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}, 0x40000000}, 0x90) 03:46:31 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900002602000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1132.623751] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1132.634917] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1132.656408] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:46:31 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) [ 1132.679561] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1132.694421] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1132.704340] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xc7c, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1132.777543] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1132.805351] EXT4-fs (loop1): Test dummy encryption mode enabled 03:46:31 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0xf000000, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1132.825026] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1132.864291] EXT4-fs (loop4): Test dummy encryption mode enabled 03:46:31 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}, 0x0, 0x40000000}, 0x90) 03:46:31 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c000000094c000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1132.896014] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1132.928241] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:31 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010002000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1132.970286] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:31 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000000000000000400"}, &(0x7f0000000080)=0x1e) 03:46:31 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x3, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff00000000007ac9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008ffff1f000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:31 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}, 0x0, 0x4000}, 0x90) [ 1133.140834] gfs2: not a GFS2 filesystem [ 1133.179106] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1133.204116] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1133.213149] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:32 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000000000200"}, &(0x7f0000000080)=0x1e) [ 1133.319421] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1133.328650] EXT4-fs (loop1): Test dummy encryption mode enabled 03:46:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}, 0x0, 0xff00}, 0x90) 03:46:32 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000906000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1133.360215] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1133.385987] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:32 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x200000000000000, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4c, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1133.418016] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (8191 log_block_size) [ 1133.456185] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}, 0x0, 0x1fffffe}, 0x90) [ 1133.481746] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1133.560014] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1133.581222] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1133.602161] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1133.615111] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1133.656619] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1133.677132] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:46:32 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000000000000000100"}, &(0x7f0000000080)=0x1e) [ 1133.706015] gfs2: not a GFS2 filesystem [ 1133.719112] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:32 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0xa00000000000000, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:32 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010010000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1133.766100] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (8191 log_block_size) 03:46:32 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000901fe0001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}, 0x0, 0x4000000000000000}, 0x90) 03:46:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9070000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1133.844978] gfs2: not a GFS2 filesystem 03:46:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000800000000fffffff500002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:32 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) 03:46:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x700000000000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:32 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0xd4170000, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1134.054148] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1134.054956] EXT4-fs (loop7): Test dummy encryption mode enabled 03:46:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}, 0x0, 0xff000000}, 0x90) [ 1134.111613] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1134.132546] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1134.166971] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1134.198551] f2fs_msg: 166 callbacks suppressed [ 1134.198566] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1134.212870] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1134.219863] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1134.237749] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1134.259437] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock 03:46:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}, 0x0, 0xfeffff0100000000}, 0x90) [ 1134.301369] EXT4-fs (loop4): Invalid log block size: 4278190080 [ 1134.315935] EXT4-fs (loop1): Test dummy encryption mode enabled 03:46:33 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000600"}, &(0x7f0000000080)=0x1e) [ 1134.350201] F2FS-fs (loop5): Invalid log blocks per segment (16646409) [ 1134.350201] [ 1134.378663] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:33 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0xa00, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1134.409074] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock [ 1134.430247] EXT4-fs (loop4): Test dummy encryption mode enabled 03:46:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}, 0x0, 0x100000000000000}, 0x90) [ 1134.456807] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1134.496118] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:46:33 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008ffffffffffffffff00002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1134.531128] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1134.549668] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1134.562768] EXT4-fs (loop4): Invalid log block size: 4278190080 [ 1134.590188] gfs2: not a GFS2 filesystem 03:46:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}, 0x0, 0x2000000}, 0x90) 03:46:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9004400ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:33 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x3f00, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1134.628249] F2FS-fs (loop5): Invalid log blocks per segment (16646409) [ 1134.628249] [ 1134.653141] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock [ 1134.726776] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1134.798247] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1134.807888] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1134.815186] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1134.858475] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1134.876424] EXT4-fs (loop7): Unsupported filesystem blocksize 0 (-1 log_block_size) [ 1134.888591] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1134.957830] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:33 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900000005000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:33 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) 03:46:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008fffffffe0000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:33 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfcfdffff, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}, 0x0, 0xfeffff01}, 0x90) 03:46:33 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0xf000000, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1135.023931] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1135.039972] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1135.068032] EXT4-fs (loop7): Unsupported filesystem blocksize 0 (-1 log_block_size) [ 1135.089165] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1135.100691] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1135.143871] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}, 0x0, 0xff00000000000000}, 0x90) 03:46:33 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000000000000ffffffff00"}, &(0x7f0000000080)=0x1e) [ 1135.192007] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1135.239172] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1135.250084] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (16711679 log_block_size) 03:46:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}, 0x0, 0x1000000}, 0x90) 03:46:34 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008f6ffffff0000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:34 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x9effffff00000000, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9040000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1135.394985] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1135.448068] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1135.461126] gfs2: not a GFS2 filesystem 03:46:34 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900000004000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1135.488488] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1135.528636] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (16711679 log_block_size) 03:46:34 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000000000000000300"}, &(0x7f0000000080)=0x1e) [ 1135.559369] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:46:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}, 0x0, 0x2}, 0x90) [ 1135.600611] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1135.607100] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000090000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:34 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0xd4170000, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1135.651389] EXT4-fs (loop7): Unsupported filesystem blocksize 0 (16777215 log_block_size) [ 1135.691566] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:34 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xa00, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:34 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000000000100"}, &(0x7f0000000080)=0x1e) [ 1135.823454] EXT4-fs (loop7): Test dummy encryption mode enabled 03:46:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}, 0x0, 0x200000000000000}, 0x90) [ 1135.875592] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1135.883003] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:46:34 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900400001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9100000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1135.998747] EXT4-fs (loop7): Unsupported filesystem blocksize 0 (16777215 log_block_size) [ 1136.032377] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:46:34 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0xffffff7f, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x3) [ 1136.126596] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1136.144559] gfs2: not a GFS2 filesystem [ 1136.183476] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1136.200593] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1136.221467] EXT4-fs (loop4): Invalid log block size: 589824 03:46:34 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008140000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:35 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000000000500"}, &(0x7f0000000080)=0x1e) 03:46:35 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c00000009003f0001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:35 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x8f) [ 1136.361900] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1136.399932] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:35 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x3f00000000000000, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1136.419142] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008002d00000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1136.485800] EXT4-fs (loop7): Test dummy encryption mode enabled 03:46:35 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7c0c, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:35 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000300"}, &(0x7f0000000080)=0x1e) 03:46:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9620000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1136.600671] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:46:35 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x20001890) [ 1136.670057] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:35 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0xf, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:35 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000500"}, &(0x7f0000000080)=0x1e) [ 1136.759659] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1136.783121] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:46:35 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900230001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1136.849354] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1136.878521] EXT4-fs (loop4): Unsupported filesystem blocksize 8388608 (45 log_block_size) 03:46:35 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x5000) [ 1136.899163] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1136.913386] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1136.961879] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1137.019906] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1137.044027] EXT4-fs (loop4): Test dummy encryption mode enabled 03:46:35 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0xffffff7f00000000, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1137.068998] gfs2: not a GFS2 filesystem 03:46:35 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x5, 0x0) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/229, 0xe5}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f00000001c0)=""/24, 0x18}, {&(0x7f0000000340)=""/50, 0x32}], 0x4, &(0x7f0000000400)=""/249, 0xf9, 0x80000000}, 0x2) bind$bt_hci(r1, &(0x7f0000000540)={0x1f, r2, 0x1}, 0xc) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1137.110255] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1137.125006] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1137.222265] EXT4-fs (loop4): Unsupported filesystem blocksize 8388608 (45 log_block_size) 03:46:36 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000000000000100002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:36 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000600"}, &(0x7f0000000080)=0x1e) 03:46:36 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c000000090000262e000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1f8, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:36 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000400"}, &(0x7f0000000080)=0x1e) 03:46:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008050000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:36 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0xf0ffffffffffff, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9140000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1137.665475] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1137.726418] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:46:36 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) 03:46:36 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c00000009000003a0000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1137.792108] EXT4-fs (loop7): Invalid log cluster size: 65536 [ 1137.888310] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1137.895603] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1137.903470] gfs2: not a GFS2 filesystem [ 1137.939435] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1137.948486] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1137.971007] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1137.992657] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1138.023456] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:36 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0xf0ffff, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1138.061294] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1138.149622] EXT4-fs (loop7): Invalid log cluster size: 65536 [ 1138.172075] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1138.193062] EXT4-fs (loop1): Test dummy encryption mode enabled 03:46:36 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000000000300"}, &(0x7f0000000080)=0x1e) [ 1138.220892] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1138.232679] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1138.242540] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1138.242561] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffff6, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:37 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000910000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:37 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x3, &(0x7f0000000080)=0x2) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:46:37 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0xf00, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:37 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec0000000100080000001f0000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:37 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000000000000000200"}, &(0x7f0000000080)=0x1e) 03:46:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9210000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:37 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) socket$bt_rfcomm(0x1f, 0x3, 0x3) 03:46:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008140000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:37 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000000000000000500"}, &(0x7f0000000080)=0x1e) 03:46:37 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0xa, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:37 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x400080, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000740)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20002}, 0xc, &(0x7f0000000700)={&(0x7f0000000680)={0x6c, r2, 0x500, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7f}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x794}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'gre0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000000) sendmsg$nl_generic(r1, &(0x7f0000000140)={&(0x7f0000000440), 0xfb93c0d5, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000210016022cbd7000ffdbdf2508000000140092006574683073656c8fc1b236aaf4adca001000000008008400", @ANYRESOCT=0x0, @ANYBLOB="04003600"], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x10) r3 = socket$inet6(0xa, 0x2, 0x0) pwritev(r0, &(0x7f0000000300)=[{&(0x7f0000000180)="c1a42e51ceaf121faba2766b0e6b5c553d70424fb096e967e2781a62d5921c1d05b6869c712adc921a9188", 0x2b}, {&(0x7f00000001c0)="55fff0a17a01e5e6edfb853572e6ed7a9015ad2ef8afafc066410a9720", 0x1d}, {&(0x7f0000000240)="4d923ed53b12d1c1815a57c82548854fa778caa01a757135584859ca01eb06c9c10b8a26115dbd7682891ee15b8934d8b0dcf6de68ca55b3bb458c22633070", 0x3f}, {&(0x7f0000000280)="de0262dfd1897fa359b938aa59b0025cb987f41b36c89c49d69295e927bfd0da16a0572653878e97d72d4ce3609def5077f3ffa15ae40bd12d6471af19be64b686eb96f6f1a8023d63e1b9fb74ff3812ac3693f3151111b8eabbcb4d458575d42e3a6db30331", 0x66}], 0x4, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) timer_create(0x1, &(0x7f0000000040)={0x0, 0x12, 0x4, @thr={&(0x7f0000000480)="e27e763a391dead2186629ad5a8234e6acc7ec7f33b5d1bd556a17e62da0bf9c4b2c54c6dc22f11d1832b6a047303bbd3e8904d6888176d17cc01cb267f6439a228df48afa22a0efe2dbf7c712d4746d9d58816e209436d8083c0d546986168f304cf8ad12f39840fa0a1ec7fc8b6601e66579118d398f35b73a5a0a60bd6352da417c9e34bbd22f9c1da730ae6b8ccbb4c4c756fa6d3c5fb7766360cc2ac2f61715fd3409213ebfac1c72792774", &(0x7f0000000540)="7c2822db399cfa8b2b045386d424bebb970c6d3fdcce3ee3bd5303c96ca699ff67a48174a1431c31687b830a55ba283330230e4b8f7f41b914b70ddceabf959baec67eb479969cf10c2f499a709b06b01ac13c2887f3fb4fa17799c0c57e61b2ba4b2da0a47a9402324f8b346a63f78b041363547ae1926284bbe6963fc06b3fc198633138782e8e5b81673631981e3558ecd968a49f7c88025c8edc43885e2baa5d16a8502290905dddddae00d0faa2103e6fe9b0aae40701ebbc15cfc720265197fbec5f85d715351cef897de6bdc90cadfe6034b159d6d1b0cb40b806bd1ddc2c8268f5c75d56ae7a64a6"}}, &(0x7f00000000c0)) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:46:37 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) 03:46:37 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0xa000000, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:37 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) getpid() setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:46:37 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000300"}, &(0x7f0000000080)=0x1e) [ 1139.543134] blkid (29249) used greatest stack depth: 11224 bytes left [ 1140.191876] f2fs_msg: 110 callbacks suppressed [ 1140.191891] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1140.192235] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1140.196535] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1140.219823] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1140.220758] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1140.227413] EXT4-fs (loop7): Invalid log block size: 2031616 [ 1140.236466] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1140.239422] gfs2: not a GFS2 filesystem [ 1140.239595] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1140.247626] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1140.251115] F2FS-fs (loop5): Invalid log blocks per segment (4105) [ 1140.251115] [ 1140.276855] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:46:39 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x3f000000, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1140.286044] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock [ 1140.310427] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1140.317551] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1140.330352] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1140.369981] F2FS-fs (loop5): Invalid log blocks per segment (4105) [ 1140.369981] [ 1140.379897] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock 03:46:39 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000905000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:39 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)=ANY=[@ANYRESHEX=r1], 0x1) 03:46:39 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf5ffffff00000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:39 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008020000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:39 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) 03:46:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9530000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:39 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x2000000, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008030000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:39 executing program 2: r0 = socket$inet6(0xa, 0x800, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000a0000000000000000000000000000000000ffffac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d46100004cbe326821f5d77a170ea8f26bdca2e5963493223af7ba0b3860e3e67cc18f907225ba6d004e1fe7195dd46c134d7b17741ede"], 0x90) 03:46:39 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000000000000000600"}, &(0x7f0000000080)=0x1e) 03:46:39 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) 03:46:39 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x34000, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:39 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r1 = getpid() socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000000)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000000000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0b4"], 0x78) sched_setscheduler(r1, 0x800002, &(0x7f0000000200)=0x200000000) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000a0000000000000000000000000000000000ffffac1414aa0000000000000000000000000000000010000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000008e000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000"], 0x90) 03:46:39 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) 03:46:39 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x1000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) r2 = dup(r0) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000080)={0x0, 0x4, 0x9}) ioctl$SG_GET_SG_TABLESIZE(r2, 0x227f, &(0x7f0000000000)) [ 1140.985515] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1140.993885] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1141.000178] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1141.006749] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1141.050857] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1141.063522] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1141.074900] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1141.082630] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1141.096127] gfs2: not a GFS2 filesystem [ 1141.113158] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1141.143050] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1141.158738] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:39 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0xf0ffffff00000000, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1141.272479] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1141.278934] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1141.286959] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1141.295247] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1141.304631] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1141.313319] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1141.321375] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1141.330877] EXT4-fs (loop4): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1141.345649] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:40 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000000000600"}, &(0x7f0000000080)=0x1e) 03:46:40 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x200000000000000, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:40 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c00000009006c0001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:40 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfdfdffff, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:40 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000800000000fffffff400002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9bc0300ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec0000000100080000000000000fff00002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) getpid() setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:46:40 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000500"}, &(0x7f0000000080)=0x1e) 03:46:40 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x40030000000000, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1141.751620] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1141.754056] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1141.757878] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1141.802382] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1141.819901] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1141.864215] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1141.891215] EXT4-fs (loop4): Invalid log cluster size: 16715520 [ 1141.897681] EXT4-fs (loop7): Invalid log block size: 4278190080 03:46:40 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c00000009007a0001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000a000000000000000000000000000000d0853baf27250000ffffac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f989ea90d782b466a3e60c557d5a99682f83da3ac225d4b22db8c36d713add8c"], 0x90) 03:46:40 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000300"}, &(0x7f0000000080)=0x1e) [ 1141.910312] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1142.008585] gfs2: not a GFS2 filesystem 03:46:40 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x300000000000000, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{0xb, 0x94}, {0x4, 0x800}, {0x4, 0x7911}, {0x2}, {0x4}, {0x3, 0x1}, {0xe, 0x2}, {0x4, 0x9}, {0x2, 0x7}], 0x9) sched_setscheduler(r1, 0x7, &(0x7f0000000100)=0x40000200fffffc) tgkill(r1, r1, 0xe) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) link(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x400, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f00000001c0)=0x10000) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f0000000180)) socket$inet6_udp(0xa, 0x2, 0x0) [ 1142.072159] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1142.118725] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:46:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c90a0000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f0000000080)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000a0000000000000000000000000000000000ffffac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x90) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x4e22, 0x1f, @empty, 0x6}, {0xa, 0x4e20, 0x0, @empty, 0x8}, 0x4501, [0x9, 0x80000000, 0x3, 0x7, 0xc27, 0x0, 0x86, 0x400]}, 0x5c) 03:46:40 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7c0c0000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:40 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c00000009000021a5000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1142.191289] EXT4-fs (loop7): Invalid log block size: 4278190080 03:46:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000000000003f00002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:41 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000800000000fffffff600002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:41 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000000000000ffffffff"}, &(0x7f0000000080)=0x1e) 03:46:41 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x400300, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000240)=ANY=[], 0x0) [ 1142.417445] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1142.495855] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1142.517842] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() ptrace$setopts(0x4206, r1, 0x0, 0x100040) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:46:41 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000000000600"}, &(0x7f0000000080)=0x1e) [ 1142.557895] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1142.570795] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1142.588251] EXT4-fs (loop4): Invalid log cluster size: 4128768 03:46:41 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c000000090000042b000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:41 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0xa00000000000000, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1142.648178] gfs2: not a GFS2 filesystem [ 1142.656242] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1142.683957] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:46:41 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1142.740107] EXT4-fs (loop7): Invalid log block size: 4278190080 03:46:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000500000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c92d0000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1142.865614] EXT4-fs (loop7): Test dummy encryption mode enabled 03:46:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffff5, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:41 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) 03:46:41 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0xffffff9e, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1142.983267] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1142.993885] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1143.017703] EXT4-fs (loop1): Test dummy encryption mode enabled 03:46:41 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000974c858d9000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1143.033298] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1143.078887] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1143.091526] EXT4-fs (loop7): Invalid log block size: 4278190080 03:46:41 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x40, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000080)={0x5000000000, 0xfe5, 0x0, 0x0, 0x0, [], [], [], 0x7, 0x7cd}) r1 = socket$inet6(0xa, 0x2, 0x0) clone(0x2002102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1143.136198] EXT4-fs (loop4): bad block size 32768 [ 1143.152762] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:41 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000800000000fffffff500002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:41 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000000000600"}, &(0x7f0000000080)=0x1e) 03:46:42 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000a0000000000000000000000000000000000ffffac1414aa00000000000000000000000000000000000000000000000000000000000000000000002b7d6109764e461600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x90) 03:46:42 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0xfffffff0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1143.274249] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1143.310446] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1143.354097] EXT4-fs (loop4): bad block size 32768 [ 1143.391677] gfs2: not a GFS2 filesystem 03:46:42 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000909000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:42 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000000000000000002"}, &(0x7f0000000080)=0x1e) 03:46:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000900000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:42 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000000)) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x7ff, 0x40000) ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f00000003c0)=""/4096) [ 1143.488359] EXT4-fs (loop7): Test dummy encryption mode enabled 03:46:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9d00300ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1143.540320] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1143.596323] EXT4-fs (loop7): Invalid log block size: 4278190080 03:46:42 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x2, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:42 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000000000000000006"}, &(0x7f0000000080)=0x1e) [ 1143.676161] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1143.713860] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1143.762429] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1143.768769] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1143.816683] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1143.851941] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:46:42 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffeb, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:42 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c000000097a000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:42 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000a0000000000000000000000000000000000ffffac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005f32719c0e737e69a453c8ffb8846ebd0c9094374b9681f1d1bccde6ff3547afe43b4f5593a7ac0f65d133671592e805660dfe61bb4fb02c6b3e6814d40e4d0b30f97b6aa0b1f685e7327a"], 0x90) 03:46:42 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x46612aeafc000000, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1143.861830] EXT4-fs (loop4): Unsupported filesystem blocksize 524288 (9 log_block_size) [ 1143.869952] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1143.888784] EXT4-fs (loop7): Invalid log block size: 4278190080 03:46:42 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) [ 1144.000508] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1144.013664] EXT4-fs (loop1): Test dummy encryption mode enabled 03:46:42 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000210000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:42 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x40, 0x0) write$tun(r1, &(0x7f0000000240)={@void, @void, @eth={@local, @empty, [], {@mpls_mc={0x8848, {[{0x6, 0x7, 0x1f, 0x82f}, {0x8001, 0x80000000, 0x4, 0x7ff}, {0x9, 0x10001, 0xd5, 0x7}, {0x5, 0xc594, 0x1, 0x3f50}, {0x0, 0x3, 0x4, 0x10001}, {0x7, 0x30b, 0x4e, 0x7}, {0x80000000, 0xfff, 0x1, 0x7fff}], @generic="876fac162def364134910d545b61e6aad1064353c261e7353c4af42a450200c7d6ab9e00b2612fc160b05b36e465a64668691e6b537d400824b2ca509501ecd410eb728d8ee1b926e8d1ee2cc513ac7c7f94345d80683cc2be147d8ceb99f85058be92073f0666d940df31c8ab6fc65a22958e3319e33ce20045ad576dc4646247d5f5c33d1244885928ef475dc03eb7624f2d37fef851d0a508874a18898feabee9baaa23e279ec9a3659792d587797a0cc71482b17f30c36352fbbbb7f2ac93d8f50661606119979f81752b9a08f236c1fdf12176bd98cef87fd922f"}}}}}, 0x107) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000a00fb000000ddcfa1191ea25b8600000000ffffac1414aa000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001900000000000000000000000000000000000000000000000000000000000029a80ce3ba78ca5717e2e6cb55e62e8463b343cc7153ed1af4b29fdba8d88fafea84b4fedecd6a17ad64f548dca3cd4a274762c5671fd85eb707a8e009ae73324ad2b076bf2e6b002e43f17cf224815b9f423a57662c236a0c9a117c737eaf7a4cd557"], 0x90) [ 1144.060937] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1144.068426] EXT4-fs (loop4): Unsupported filesystem blocksize 524288 (9 log_block_size) [ 1144.091233] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:42 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000907000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:42 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f0000000040)=0x7) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1144.161147] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:42 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x3000000, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000800000000ffffffff00002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1144.281706] gfs2: not a GFS2 filesystem 03:46:43 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)=0x0) move_pages(r1, 0x8, &(0x7f00000001c0)=[&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff6000/0x4000)=nil, &(0x7f0000ff7000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff7000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil], &(0x7f0000000340)=[0x6], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6) sendfile(r0, r0, 0x0, 0x0) r2 = getpgrp(0x0) capget(&(0x7f00000000c0)={0x1998032c, r2}, &(0x7f0000000100)={0x2, 0x8, 0xd6, 0x1, 0x1, 0x8}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x100000001, &(0x7f0000000400)=""/92) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r3 = getpid() prctl$setendian(0x14, 0x2) sched_setscheduler(r3, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000180)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000240)=ANY=[@ANYBLOB="00000000000000000a000000000000ffffac1414aa00000000000000000000c220aec967e5d43f8015c2ec580000000000000000000000000000010400000000000000000000000000000e0000000000000000000000000000000000000000000000000000000000000000000000006076db6cc15e9fd1f66f000000000000000dc4a089000000ee75d52ab084dac7e0a1903097d5e85ebf423d73b3bac33f545a860cfaac82db00000000"], 0x90) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={0x0, 0x1}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={r4, 0x3}, &(0x7f0000000300)=0x8) 03:46:43 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) [ 1144.307790] EXT4-fs (loop7): Test dummy encryption mode enabled 03:46:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9020000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1144.352979] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1144.426718] EXT4-fs (loop7): Invalid log block size: 2162688 03:46:43 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x800) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000140)=0x5, &(0x7f0000000180)=0x4) splice(r0, &(0x7f0000000000), r0, &(0x7f0000000040), 0x1, 0x1) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'HL\x00'}, &(0x7f00000000c0)=0x1e) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:46:43 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000000000400"}, &(0x7f0000000080)=0x1e) 03:46:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6c00000000000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:43 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900000003000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:43 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x9effffff, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1144.607252] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1144.613765] EXT4-fs (loop1): Test dummy encryption mode enabled 03:46:43 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000800fc00000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1144.689977] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1144.719979] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1144.756085] EXT4-fs (loop4): Invalid log block size: 4278190080 03:46:43 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000500"}, &(0x7f0000000080)=0x1e) [ 1144.835645] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:43 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000003c0)={0x200, {{0xa, 0x3ff, 0x101, @mcast1, 0x2}}, 0x1, 0x9, [{{0xa, 0x4e20, 0x8001, @mcast1, 0x3}}, {{0xa, 0x4e24, 0x7926, @remote, 0x7f}}, {{0xa, 0x4e23, 0x3, @remote, 0x7}}, {{0xa, 0x4e24, 0x4, @ipv4={[], [], @local}, 0x1000}}, {{0xa, 0x4e21, 0x1, @loopback, 0x3}}, {{0xa, 0x4e20, 0xf92e, @loopback, 0x46}}, {{0xa, 0x4e22, 0x100000000, @loopback, 0x80000000}}, {{0xa, 0x4e22, 0x5, @remote}}, {{0xa, 0x4e20, 0x100, @mcast2, 0x800000000000000}}]}, 0x510) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:46:43 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x300, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:43 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000000000100"}, &(0x7f0000000080)=0x1e) [ 1145.061037] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1145.067781] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1145.082236] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1145.093047] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1145.099556] EXT4-fs (loop4): Invalid log block size: 4278190080 03:46:43 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() r2 = request_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000140)='\x00', 0xfffffffffffffffc) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000080)="506dbc92aee256a36228a3521925dd85b9e3cd940f08d07d953b8d068e450edf3acf5f121e163f337990f7d13ed91d3796db7c46cdb7b638baef142f3f8ebe", 0x3f, r2) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:46:43 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900000014000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1145.113190] EXT4-fs (loop7): Unsupported filesystem blocksize 0 (252 log_block_size) [ 1145.248692] gfs2: not a GFS2 filesystem [ 1145.293924] EXT4-fs (loop7): Test dummy encryption mode enabled 03:46:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000010000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9430000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:44 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) [ 1145.338618] f2fs_msg: 158 callbacks suppressed [ 1145.338631] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1145.377182] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:46:44 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)=ANY=[@ANYBLOB="00000029380000000a000000000000000000000026d801260000ffffac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000002eec00d10051067baec92b295e9f3ff0fb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x90) [ 1145.412727] EXT4-fs (loop7): Unsupported filesystem blocksize 0 (252 log_block_size) 03:46:44 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x3, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1145.460190] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1145.524682] F2FS-fs (loop5): Small segment_count (22 < 20 * 14) [ 1145.534869] EXT4-fs (loop4): Test dummy encryption mode enabled 03:46:44 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) [ 1145.575030] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock 03:46:44 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) readahead(r0, 0x6, 0xf2c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getpid() setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x90) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000080)={0x1d, 0x1, 0x80000000}) splice(r0, &(0x7f0000000200)=0x42, r0, &(0x7f0000000380), 0x7ff, 0x2) r2 = dup2(r0, 0xffffffffffffff9c) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3) clone(0x22000000, &(0x7f0000000100)="7e04e39fe0f3161bd02deca0ed3392a21c8b5212b9521d8211da69fe596df9d12c409505ab7e58ba94a361c336cef41e90ce5c394fc708552f89024c5b0d1f872242091930b6ad0f3f00e33b7522a3f959380aa76f03ecc615777bec78196008d1fe089c1df598308e484baa51342b5a8a2b7a43c3d698691c36b347f127a4bb17d0ebdfb5dc4c7d44717d81098408ed3ac0ea", &(0x7f00000001c0), &(0x7f0000000240), &(0x7f0000000280)="033b6a5ad0f3f45fb51ae481c206701d3f7793cbda74b89f2b9d0b96fa59af6e531e0b5ec1862f8c6ef908ba96ffc3fbd5830022a2c380c94e094adaf413a783b2132d2abfe06c9ce5b89d0f0fdbd6f3c3743e766daa8ff411a1e926e98318af757fa885506a6f1a9140b3356b71ac45fc1b5dd031a8500879935d45e7e218c4c601d352771ef816244bd539c1f397de07a3b6fc91cbd4cf8edd78d74190fedc2b5d72f3977fc1ed34f08c8319ff8a56b652096677ebcd73c8de367baeaf580d50df8be2d425c59b2579d4327c369ff33d5cb94c75419f0b788cb1d4c64922a857b2fbbaf6") 03:46:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffff1f0000000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:44 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000800000000c0ed000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1145.617034] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1145.648097] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1145.659654] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1145.690067] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1145.697766] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1145.713862] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1145.746241] F2FS-fs (loop5): Small segment_count (22 < 20 * 14) [ 1145.762509] EXT4-fs (loop4): Invalid log block size: 65536 03:46:44 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000000000000000003"}, &(0x7f0000000080)=0x1e) [ 1145.809903] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock [ 1145.847978] QAT: Invalid ioctl 03:46:44 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0xfffffffffffff000, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1145.982973] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1145.993714] QAT: Invalid ioctl [ 1145.996714] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1146.023201] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1146.034729] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1146.051029] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:44 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@'}, &(0x7f0000000080)=0x1e) [ 1146.068083] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1146.072478] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1146.083739] EXT4-fs (loop7): Invalid log block size: 3221225472 [ 1146.098259] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock 03:46:44 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0xf00000000000000, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1146.123778] gfs2: not a GFS2 filesystem [ 1146.132929] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1146.153793] EXT4-fs (loop4): Invalid log block size: 65536 03:46:44 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c000000090c000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:45 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000000000000000001"}, &(0x7f0000000080)=0x1e) 03:46:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9230200ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1146.320604] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1146.359281] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:46:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000004000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:45 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x20080, 0x0) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000013c0)={{{@in, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000001c0)=0xe8) getresgid(&(0x7f00000002c0), &(0x7f0000000300)=0x0, &(0x7f0000000340)) sendmsg$unix(r2, &(0x7f0000001540)={&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000000c0)=[{&(0x7f00000003c0)="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", 0x1000}], 0x1, &(0x7f00000014c0)=[@rights={0x18, 0x1, 0x1, [r0]}, @cred={0x20, 0x1, 0x2, r1, r3, r4}, @cred={0x20, 0x1, 0x2, r1, r5, r6}], 0x58, 0x2654e742545eba3d}, 0x4004800) 03:46:45 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x100000000000000, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:45 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000000000000000004"}, &(0x7f0000000080)=0x1e) 03:46:45 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1146.393592] EXT4-fs (loop7): Invalid log block size: 3221225472 03:46:45 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000800000000ffffffeb00002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1146.624085] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1146.659313] EXT4-fs (loop1): Test dummy encryption mode enabled 03:46:45 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0xfffff000, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1146.670692] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1146.690996] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1146.713320] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:45 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = gettid() ptrace$peekuser(0x3, r1, 0xff) r2 = getpid() sched_setscheduler(r2, 0x3, &(0x7f0000000100)=0xffff) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000a00000000000000fe800000000000000000000000000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e2827aea04"], 0x1fa) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x9, 0x2) 03:46:45 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000974000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1146.733422] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:46:45 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?'}, &(0x7f0000000080)=0x1e) [ 1146.801010] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1146.810167] EXT4-fs (loop4): Invalid log block size: 1024 [ 1146.820508] EXT4-fs (loop7): Invalid log block size: 4278190080 03:46:45 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000a0000000000000000000000000000000000ffffac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002736736329d6"], 0x90) 03:46:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008fffffff50000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1146.924756] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1146.946866] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1146.954127] gfs2: not a GFS2 filesystem [ 1146.987412] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1147.008475] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1147.031121] EXT4-fs (loop7): Invalid log block size: 4278190080 03:46:45 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) 03:46:45 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0xf000, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:45 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c00000009000c0001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1147.100698] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9cf0300ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:45 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='bond_slave_0\x00', 0x10) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x5be1, 0x440001) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x113, 0xd}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000240)={0x8, 0x120, 0xfa00, {0x0, {0x8, 0x10000, "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", 0xd, 0x618, 0x100000000, 0x8, 0x5, 0xfb40, 0x100, 0x1}, r3}}, 0x128) 03:46:45 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000140000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:45 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3f000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1147.218837] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1147.291422] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1147.327071] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1147.341944] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (16121855 log_block_size) [ 1147.357161] EXT4-fs (loop7): Test dummy encryption mode enabled 03:46:46 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000600"}, &(0x7f0000000080)=0x1e) [ 1147.402084] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1147.421602] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:46 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$can_raw(0x1d, 0x3, 0x1) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1147.455665] EXT4-fs (loop7): Invalid log block size: 1310720 03:46:46 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x17d4, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1147.516028] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1147.540992] EXT4-fs (loop4): Test dummy encryption mode enabled 03:46:46 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c000000097fffffff000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1147.587867] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1147.588066] EXT4-fs (loop7): Test dummy encryption mode enabled 03:46:46 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a'}, &(0x7f0000000080)=0x1e) [ 1147.637621] gfs2: not a GFS2 filesystem 03:46:46 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000080)=0x80) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f00000000c0)={0x0, 0x1, 0x4, @broadcast, 'bond_slave_1\x00'}) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1147.698783] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (16121855 log_block_size) [ 1147.714015] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1147.733595] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1147.752993] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1147.787458] EXT4-fs (loop7): Invalid log block size: 1310720 [ 1147.793894] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008002000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:46 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0xd417000000000000, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:46 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000000000500"}, &(0x7f0000000080)=0x1e) 03:46:46 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xff0f0000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:46 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000080000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:46 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000a00000000ebfffffffffff2390000000000ffffac1414aa0000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002d000000000000000000000000000000000000000000000000"], 0x90) 03:46:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c903001fec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:46 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900000016000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1148.047488] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1148.080015] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:46:46 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x1000000, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1148.135184] EXT4-fs (loop4): Invalid log block size: 32 [ 1148.170842] EXT4-fs (loop1): Test dummy encryption mode enabled 03:46:46 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) [ 1148.194679] EXT4-fs (loop7): Test dummy encryption mode enabled 03:46:46 executing program 2: socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) getpid() [ 1148.244681] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1148.277630] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1148.319279] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1148.350767] EXT4-fs (loop7): Invalid log block size: 524288 [ 1148.359926] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:47 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000100)=[{&(0x7f00000003c0)="3e2af70491e43cc2468d55c0fbec04371a192ad2702f3697a3b11cd4dc402c1a0f99d05ccb83fd32b97e07627f28dfe768b54a2dc1364871c1a7acc6bb3a31219f2d50ddfbcc13d5cb50c36416b9f246a3807a4e828825a786917042a03c6076e80e2be6eeebe1e8957d01df8027d07df8624bfbd3adf6c0e57d124e56214c0408af20a186f92539c3c584fddd0bccd90ddaef30b744c764c0d29e29d9fa69c0c028eb30df5d595a1b90ef9b8ed437d43ba66750d6027bfe6673888d3b10e915edf5cf61afd7d6deeb1e58a97d10441f8ba7a38ab9192d6cc6443a7a971c76ba009446f83210b6d0e014c1aee905f33ee3a29be80abcc96f84fd7b9b10b8ddc0c5a94a343f9d5b1d6253261cb0755e29f2a056c7db0df01d3d8c5e309fa1f623a4880eb846d4b201d7d65a67b332d75ebfb6008197a2f764a5c47e131bdadd44a59a4936889a6800c3b646f89327f3a4f9366d24e8106c58d13f998727c7dc7617b491adcc52de05177f6587510940cb0ba42184aa0a93eac0065d84a4b915c2208136c412662110c68e98b8482116948a2c23029ca8c2fba3b99184a963d1b1275f3a893f256efe76553b0bda4dd757dbfeb09e21fb01c6b2804a78896c642338daeb1309b86a7e8efe9dd2bd9c76a04098c4648f674137e9fa400509fa7f87620a9c215a226ccd11a3d22fc788597fab43901aec2beab0d5ec61e75ca7db63de7cf048954b8e075fdf8f92f7c0e1c80d3b07eae420b58cb58fc47732c9dcddadbbfc94950435de5fdbf60b1ecb10acc318f5853368f2e653d2cdb99fbd2f0b1a4c786091ba0f5a48358f16d567b0f0373231f765ef28fdb742b091e4118832cef13afe0925d2b2e526ff94742cfff790418601dc03ea82b6335441c87e234f65dc01ec08a83d4d68c769dcac83a07e776aaef7fa5bd7e3b8725454f37a42b5c1da0a1eceb07e8e4b661ea73d9ca97532a2aebc1264ccf490e797db483bc3bf6506e59f8a02e39644b35fca9f59ea5d8683d6bec1007850fca14df3f40aa07f4f61394b5db5a104fc6df81d10d6d38c62523b546521872c9fafcdac2931481aa89774707845850541c588efbb937c160946ccc64a1149f47ae86ccaa3e1d5cfbddd9db6c1bbfea1aa0e39418776e868855046b6adc271fb239a558e289586104109102796e938d2fb1580b7bf93fb13adb535831d5a2a9457c3d0a0ceb227769982677095c00c8a51dd5f6107433b7bd225b8160cfa43103f44579f366b4fa37f9ef9cdd58f04c158119b07739fdde206665d998fff0ce311e6db85b78ac84618c0a13691625b9b99fe6be77ce71e3bec2efef32e3b094fcde4ee466f1a12c129c34f7b0ff16ae474f56fe9e48807cf63878b8faa1deca49da1380384b41c0adebc48e924e3113ede955a96150a9e2aac7263d6f420b044be8df2a281e287faec9cdb7b79d320fd82dabba8fa018923185835956c790b38868b3d125c20b7b4f1f45ad67eb58fd8f318ba2a671a81166782422c1d03f2e89beb13423c07fe4a722171a0d8198f829ff6c91d1681143254d224fd53809a0ebf5dfcdd5f9af7da909efdcbceac628974e656c860b07a35b2a06c4c914b4cc21a1555912ae321e836cfb94d1b41d8a2eb364f756b461812bb74232d35c776589426cb3bc4a3aaf72f7ec7ef539e595418a1fcb0ec687b007849b80625b96012dd499050f90419ed2c272d081800eeef76cd7962726e11a303afc42c7ef9732117c836376808d86cac65749337e76b546b077ee587253293748cb44245fcc6c9b133e94d1057bf6004b691328772aefcaadc352f3e2b57ba9c9a59eee046c8b0e419b603e3bdc0ee2afdf7c0974f0f4febe556dd6b477d3d37c8b31cd7f7068b7a410cae350799d177a1cda0e2bf07ef56940824180f93619dad76d7c25f462f326ca2f24e5f9bbcc9c8429c43d986dcd4474db771dbb101205c6548dc18a0dc71e1b1f9aa367f38134f572e078fedf7d05356dd08124ca6387d8567108c3dfc3c40c4770bf257591ccb9cba176e9a716d15de8acec0b758ad6502e54a7d33b118e941cb6314de1482e0ba4ec73244b1f03dab97933480ec12e53d3a025c102d33cd6cafcdc2119141fc7c9abb82bbcc33b2cfaad645ebded30afe039244ca7c3b478c3570506b4b5415c346a5a1985fc81c1b65342f93ac8e03a9bf6d90c27ce19923a54951ec807dec1668df4a2a3da553039b8cea8d2476b58da2de84f3adf024e9db9288515bfa7fb2d7ffe835e520d4d721b9d3324544da78c2c09303c57d48368a06a00a7ffe7929efabe25dc80aee149cf3d782b315ff5eae164e110c681259a9d82890a2f67b33e4fd6bf194f42c0c18142b4ce7ba557c7531fa7789e2e49593e4065dbec8aa1d5e809f0fdcf3065ddaf82024ab2c41c9f03ab27d5ace69f23e24c69a47f7aa30d191ac07a7976fb2a17cde4991b4ef2c4b9a14f45fc646ced57bb41db7bbcb32587cdbfffb648243d8f6e5d5cc06652ab26231da50f3feed944d813d1a5d9af952a2eb99e31d38f8799deb51e4940d1ce90005b475a9586d146a4d1cc0d3bc0cc2c05b7f38495afb96135bf4ef3042189462536c4105db8b6ba364573a89ea48c48949d95fb46f097000c51bc5e8aec2f7d4c5b1e6180a22e779793437fcd50cff346f8faea2b37775b55d5aa71a57670935749241e2c0f1f85ab4c6adb10dbff6fe259efdf1beefc5f05666c76ba9970adb03f76cd501da4120adfdc38988f55e3438e9cd1deb08aea27768fa6c3e81dfbec7cf424995f8ac3a94dded746ede0cc9c18e51a21b21641ad6c8bba45cf20cea3288788949685cd7fb165ce00c1d34db870cc5b21d23d6e7c75b5534413342e5b9d83c3c28fa4eca4d3ff198a21f4120fda24865d289bc5405daea805f7f43cfd59db1cc5e045b8d7cffd3c54f5ce41b44b6a5b354f00149ea3a2ea510f70e1ed188b206b60ac95824ec36ecadddd3171e1f9ff4d48661b08f422b4488eddb0953c514a741a479c16c1070dbabf467996c247903346f56160c25c33aa5957a8ff6ec7047c658c1c6a1ded89330c0465460b13895e55c7ee3e8d83d633eaf9d7af2d28f21da9a814d42b160471d8196f310e81741ac22941553f3419e024ab6f137fe661653750f4fadf76673952e2dc21b8fd9305e32ec84bc48f2ecd21df45adbcdf663fbc5f98caa78be37d840f078dcc67da495627c8823e3d0b25c814f2e5310eea948b007dd4486230051a0b4e2f596cb429903f36eeff86b3361925af39d5771b15810ae83ef4dd194b03111f0d77d34207f008039d70db4c3f19af6f810a37deb81296cb566a1f6fad76973ea1ecdec354a8f00af2df1f39c165f3f05f26e139de268d3e3edaaa0c53dda8fc7a236e34d9fba42651251a57df895f46d4de2ced27049d9a433ccf87f476755d50f2f35cb435c6b1dbb910e1aacc52399c0a2b614205000e23b226227ac0338e7535287fe2b4b9b476908990e0a15555ca5f7012163949b0d498aef17ab017f2581e6a0198dc82b6da95512bedb9f64a1555d719922568da14a6af9ffacc81c19f9d8bfb553c1b64ff271e368cee31bf46f489b7e7fd6832a85e76d59a7bbb58817212edab2f7537f453ff36181315e7bb137df603b463d874bdc6dda116d5c1b81eff98cd2bc2a844baaf22d87bd1b437850067e89dbd77c5034eec0e025767e04d5569a0e58113411bcd5382d1a4e2cc25a09152f985a4def1f8a95bb577f3da73ad4e5269fbdd9bdd72a004581aa656454034251fa48bf64e616f4d9dcb03924f29523c37192c4de617109765586265ec236ebd50cb5900af27dbcf87fdc41b95f968b9a82018f256666ea15870c8cad68f9c8a3a50d0757d9e4450371aec1811efb3591b9aba7330cc495ac25917611f22d66724f8fcc4b82e8427e22f3c4538df257f6a039757a87cd37af4a430fec89fa9a4fd50ff80152b901e965d62cdc878948a113ebd61ec7866fa35daded867e378250c2460077acb28990aff3790a8a683d9327cafacf3ec93ff805c837e97852f551cc49d4fc09e2ca6e7736f709f6f59be10664fb6020e64b413053c98ff37f9f4b163656ba34bc27d8e2fd43c28d9ca318230749465b52eb28164b1d9519eb2cf5d422ac268e6cdb31567181e299748242d2341fcd19a9088fd0d5c1dda1de164c2f27f965d55c4972ea40a4f44bf7807ad5bce381fd8e941b3784ceafccfd79f46e65ef39c52ba4c5a54eaec390b59982e60a1f59fc56dcdaf7defba34ff16c7e6b5ede742b8c0bfc02fba1a647bd71c3dd6c4b5e5a9c9407a1bcb36609a213a8f6837598dcaf7a3ae7319661738825e6ea1c78009b61c3163ec27b23dea9ecdd3c2135600dde317022832fd32798c54b7b2ff056896a8d28f45049d67c248b9420c91464c83e7508151fc210a92da6b7071c3c46e071b0ad896ba540a57574726431eae3cd7a8d06f7b86beabdce31969e957c95ad963e58365dae7ba2eed7e956aa5326b33664598431cd0c8fa5bee91f586d5718bcf4994d99ead1e917fe5e1a4e8454bbd98a2d064ed996333cec6f5e6439b53b0d8a63c11602fefd602719d423ab030b924aeb9b752c0983b12418b14722c764c671256f0ab202c6d30794cba56f0570f130b98b3102ee3872b5de112f3d40e634026183295963dc33927e786d773ddb169414e4e37512fd953c95aa85a8dbfec7c4014674deff5b3c2bcbf3f27351e4e06435c4ff439a1f143aa688e4544125a38b5702999421018e0a14db487b723ecce9b01bb8a3d7c9d31a2cce96439c3200edbf4c240c4b0a447d7bc6001d8f00e15b1683b6482dc9ee16885e3a4fb2693c1deab4e43fea22401ef3dd9f0c28483626ed4cb06739e4df82ffb3507a92eff32e6921bb1b455f84f78a33f4557739e32a6bcf45a3e1c785f805c316afa53a061bba81cfdecd16d38703a5b41e6d7262e56c6004d9909ba0794a211e690756f7ba6037b80a45f5b0a7f93a5e6eb1343ff8c797f0ed4b774916d9c8eb7288af7881008e4c0ea4cc4fbfe5050b95129d2fa7eca2281da45b5cad683a5cef74cc6f32cc99b39242107689abfa99bf6e06a38c6a50f5376fb5f4be11d5124b70a8c1bb5c13c0a3938c8b93a505675980cd319f8e52a33fdcde7252e78126a6d60fd3d48a6ccf1fad79dc7c11af432e204cac3ad5f1e38680d4302a67973e00b8f0c3f799d8ffda27d6b6cc53aa939b5d909bad406ee3b86682e78b9a23cdf59692d65e1a3e9686e45e6f74a2c9c8b543d065fc4389e4ccc473053bffa76f3a36e9ea91b4d7758548563cf75d36adf97c1fc80d1272ecba9b9b476926982249cc04b0bb1bc90f807b7f738ad0f574441c3dba503f9204c499ebb39ac752a8b5866d28d8456182c2d76376a830284d3f2d6239a5874f67e342e0b9bf1e493fc1d11f27936803a5271a058276828be65ffb07165bcd41c6bc16f3348e3af21d61233478c9fc7502f7fe42bc8889b74518bc61d97a468d16aedb064169a4d542a73fb5d09323b7ab061b0f70f1cb55f86482eda4e8b86ee1e21c42b6722696571e2de711ae8149cfe2e2bc00fc1e5a0b90e59955f9bc991c99f93b115d5438ffd5c1001cf2b0d90304b9f58cfb66e29f4034627b867ad3e26d50b8799c42390c65e843be2548689530d709f08001ffc4ff3b184400146a20a24f376dc55598865f62b93db3c1f7b1d6dcdbb93b47c5a54a92022a9e08cb3149655b01733e20700733106c2472fbae4a241ee23ecebba720ef6a97", 0x1000, 0x6}, {&(0x7f0000000080)="5c7b6b46d7f37a347df327562d35f91568bc64d268ac33340594f36ddd35c2bb7fcd97a0f4eeb5f2c27793864c0cb1c79b2dc99960ce95622c3f60ed634e6f475996517429cdc734e3da08939cba7b2bc6276faf6b54446e5cbd354b", 0x5c, 0x1}], 0x802000, &(0x7f0000000140)={[{@shortname_mixed='shortname=mixed'}, {@utf8='utf8=1'}, {@uni_xlateno='uni_xlate=0'}, {@shortname_mixed='shortname=mixed'}, {@shortname_mixed='shortname=mixed'}, {@shortname_mixed='shortname=mixed'}, {@uni_xlate='uni_xlate=1'}, {@shortname_mixed='shortname=mixed'}, {@shortname_win95='shortname=win95'}]}) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1148.380022] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1148.406903] gfs2: not a GFS2 filesystem 03:46:47 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000000000300"}, &(0x7f0000000080)=0x1e) 03:46:47 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0xf0ffffff, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1148.462366] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1148.476850] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1148.479812] EXT4-fs (loop4): Invalid log block size: 32 03:46:47 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900000025000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1148.523524] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1148.569426] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:46:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000000000000fff002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1148.636143] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1148.661646] EXT4-fs (loop7): Invalid log block size: 524288 03:46:47 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000000000500"}, &(0x7f0000000080)=0x1e) 03:46:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9034800ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:47 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2300, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:47 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0xf0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:47 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008006000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1148.826731] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1148.844794] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:46:47 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() r2 = dup3(r0, r0, 0x80000) setsockopt$llc_int(r2, 0x10c, 0x7, &(0x7f0000000000)=0x1, 0x4) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:46:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9032100ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:47 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000200"}, &(0x7f0000000080)=0x1e) [ 1148.971078] EXT4-fs (loop4): Invalid log cluster size: 4279173120 03:46:47 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c000000096c000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1149.071181] EXT4-fs (loop7): Test dummy encryption mode enabled 03:46:47 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000a0000000000000000000000000000000000ffffac1414aa000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e8ffffff000000000000"], 0x90) [ 1149.131064] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1149.153729] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1149.163710] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1149.178898] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:46:47 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0xd417, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1149.205214] EXT4-fs (loop7): Invalid log block size: 96 [ 1149.218849] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:47 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000400"}, &(0x7f0000000080)=0x1e) [ 1149.250368] EXT4-fs (loop4): Invalid log cluster size: 4279173120 [ 1149.319996] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1149.320125] gfs2: not a GFS2 filesystem [ 1149.342537] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1149.442576] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:46:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000800fffffff500000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:48 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1149.483273] EXT4-fs (loop1): Test dummy encryption mode enabled 03:46:48 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000000000000000005"}, &(0x7f0000000080)=0x1e) 03:46:48 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0xfcea2a6146, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1149.560020] EXT4-fs (loop7): Invalid log block size: 96 [ 1149.597039] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:48 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000960000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:48 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x4000000000000000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) r2 = dup3(r0, r0, 0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f0000000000)) [ 1149.695899] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:48 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008230000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:48 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xc0ed0000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1149.783976] EXT4-fs (loop4): Test dummy encryption mode enabled 03:46:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9036c00ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1149.836335] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:46:48 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x3f00]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1149.892572] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (-167772161 log_block_size) 03:46:48 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000923000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1149.983336] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1150.011833] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1150.045952] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (-167772161 log_block_size) 03:46:48 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000000000200"}, &(0x7f0000000080)=0x1e) 03:46:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000006000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:48 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0xfffffff0]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1150.217395] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1150.237806] EXT4-fs (loop1): Test dummy encryption mode enabled 03:46:49 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x20080, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0x4008af13, &(0x7f0000000040)={0x2, 0x7}) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1150.314546] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1150.326865] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1150.330318] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1150.347610] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1150.390806] EXT4-fs (loop4): Invalid log block size: 1610612736 [ 1150.400004] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:49 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c000000090000000f000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1150.435531] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1150.446028] gfs2: not a GFS2 filesystem 03:46:49 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000000000300"}, &(0x7f0000000080)=0x1e) 03:46:49 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x100000000000000]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:49 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) r2 = msgget(0x1, 0x40) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) r4 = getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000080)={{{@in=@rand_addr, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000000180)=0xe8) gettid() getgroups(0x1, &(0x7f00000001c0)=[0xffffffffffffffff]) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000240)={{0x5, r3, r4, r5, r6, 0x0, 0x6}, 0x5, 0x10001, 0x2, 0xf8, 0x5, 0x101, r1, r1}) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}, 0x0, 0x200027f}, 0x90) [ 1150.526037] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1150.586987] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1150.660014] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000fff000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:49 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) 03:46:49 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008040000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:49 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9032300ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1150.843721] f2fs_msg: 150 callbacks suppressed [ 1150.843737] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:46:49 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x300000000000000]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1150.890888] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1150.948264] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1150.951422] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1150.958661] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1150.990034] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1151.001524] EXT4-fs (loop4): Unsupported filesystem blocksize 33554432 (65295 log_block_size) [ 1151.027236] EXT4-fs (loop1): Test dummy encryption mode enabled 03:46:49 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl(r0, 0x3, &(0x7f0000000000)="d2040451b124d0e61745f8cc77f5ad3d838a6458fa6ebef5e40df0165824a9690de5bfcd36fe55ef9e58eedc18bf0ca3ce207112dd486cbef796be541843879e7cadaa5be1aa3d31f64eda10b68cbf5f85278aaa513879a30d50f5038818ebeea58a7dc653fad1ae36db82f8ec904c53b4b6a98570331318219794b6fdb8e26f03daa32f1d27913e51d451e2fca64639970e605cd196922e8cadf501c157a570f403f14fb7d85ba4707900f5319e1035acd5b285e059003c3237bfe173ff54d9deb354eba0b55ab6db27ddfb5e5450dc") setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1151.051392] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1151.066675] F2FS-fs (loop5): Small segment_count (22 < 15 * 14) [ 1151.105636] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock 03:46:49 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) [ 1151.153093] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1151.160986] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1151.184631] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1151.192767] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:46:49 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0xffffff7f00000000]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1151.208640] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1151.239966] gfs2: not a GFS2 filesystem [ 1151.258219] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1151.276593] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1151.288218] EXT4-fs (loop4): Unsupported filesystem blocksize 33554432 (65295 log_block_size) 03:46:50 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) [ 1151.349343] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1151.357853] F2FS-fs (loop5): Small segment_count (22 < 15 * 14) [ 1151.383328] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1151.404633] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock 03:46:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000800001fffff00000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:50 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x40000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1151.552928] EXT4-fs (loop1): Test dummy encryption mode enabled 03:46:50 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900000426000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:50 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0xa000000]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:50 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) 03:46:50 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008060000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1151.609914] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1151.621832] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1151.640196] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1151.650522] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:50 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x6, 0x4c0000) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x301, 0x8, 0x80000000000000, 0x8001, 0x461, @random="755e25a5a74d"}, 0x10) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f00000018c0)={0x1, 0x0, 0x2080, {0xf000, 0x10d006}, [], "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", "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"}) socket$inet6(0xa, 0x7, 0x401) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:46:50 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) [ 1151.672469] EXT4-fs (loop4): Invalid log block size: 4294909696 [ 1151.776584] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1151.805023] EXT4-fs (loop4): Test dummy encryption mode enabled 03:46:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9037c0cec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:50 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x3f000000]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1151.830497] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1151.858855] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1151.902299] gfs2: not a GFS2 filesystem [ 1151.905329] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1151.908737] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1151.937451] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock 03:46:50 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0xfcea2a6146]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1151.989589] EXT4-fs (loop4): Invalid log block size: 4294909696 03:46:50 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000000000600"}, &(0x7f0000000080)=0x1e) [ 1152.061842] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1152.091002] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1152.098515] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec0000000100080000000fff00000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:50 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xffffffffffbffffd) clone(0x4000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() r2 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x0, 0x40001) write$P9_RWALK(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="3d0000006f0200040022010000000400000000000000020000000002000000000000000c04000000050000000000000015040000000400000000000000563b6c849eed36a24641b1b5ef38287c900bb5c0e516c7763604592580f5eb7a9963363248d2f40678067d8478c2e37605d6a1d0eb7519f18a07fa1513"], 0x3d) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x90) 03:46:50 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x60, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1152.159522] EXT4-fs (loop7): Test dummy encryption mode enabled 03:46:50 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900680001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1152.266586] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:46:51 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) [ 1152.311621] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1152.369495] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1152.385651] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1152.397334] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:46:51 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x46612aeafc000000]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1152.431266] gfs2: not a GFS2 filesystem [ 1152.442566] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1152.475461] EXT4-fs (loop4): Invalid log block size: 4279173120 [ 1152.512035] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1152.567965] gfs2: not a GFS2 filesystem 03:46:51 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) 03:46:51 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000000000003f00002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1152.601655] EXT4-fs (loop4): Test dummy encryption mode enabled 03:46:51 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900070001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:51 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0xf0ffffffffffff]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:51 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpgid(0xffffffffffffffff) ptrace$getregset(0x4204, r1, 0x6, &(0x7f00000000c0)={&(0x7f0000000000)=""/131, 0x83}) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)=ANY=[], 0x0) 03:46:51 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xedc000000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9031400ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1152.679367] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1152.704506] EXT4-fs (loop4): Invalid log block size: 4279173120 03:46:51 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x400300]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1152.884982] EXT4-fs (loop1): Test dummy encryption mode enabled 03:46:51 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102002001, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x1, 0x0, 0xdfec, 0x5, 0x8, 0x2, 0x80000000}, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000000)) capset(&(0x7f00000000c0)={0x399f1736, r1}, &(0x7f0000000100)={0x80000000, 0x509, 0x1a9f, 0xc16, 0x5, 0x62b}) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x190) 03:46:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000a00000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:51 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000000000000000300"}, &(0x7f0000000080)=0x1e) [ 1152.971082] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1153.003154] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1153.076691] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1153.105882] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:46:51 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0xf00]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1153.132215] gfs2: not a GFS2 filesystem [ 1153.141302] EXT4-fs (loop1): Test dummy encryption mode enabled 03:46:51 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c000000090000003e000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1153.185138] EXT4-fs (loop7): Invalid log cluster size: 4128768 [ 1153.200456] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:51 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000000000300"}, &(0x7f0000000080)=0x1e) [ 1153.238699] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1153.248403] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1153.271573] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1153.321250] EXT4-fs (loop4): Unsupported filesystem blocksize 1048576 (10 log_block_size) 03:46:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030410ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6800000000000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:52 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000800000fff0000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1153.506177] EXT4-fs (loop4): Test dummy encryption mode enabled 03:46:52 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x300]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:52 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) [ 1153.599948] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:46:52 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0x200) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e20, @loopback}}}, &(0x7f0000000300)=0x84) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000340)={r1, 0x6}, 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x9, 0x7}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={r2, 0x7}, &(0x7f0000000100)=0x8) r3 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) lsetxattr$trusted_overlay_redirect(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x3) [ 1153.691479] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1153.699937] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1153.723060] EXT4-fs (loop4): Unsupported filesystem blocksize 1048576 (10 log_block_size) [ 1153.724202] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:46:52 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000914000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1153.742737] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:52 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) rt_tgsigqueueinfo(r1, r2, 0x2b, &(0x7f0000000180)={0x14, 0x1, 0x80000001, 0x1}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x2042, 0x0) ioctl$TCSETS(r4, 0x5402, &(0x7f0000000240)={0x8, 0xfff, 0x8, 0x2, 0x5, 0x1, 0x81, 0xffffffffe42c599f, 0x3, 0x6, 0xffffffffffffffff}) r5 = syz_open_procfs(r3, &(0x7f0000000000)='net/udp6\x00') ioctl$DMA_BUF_IOCTL_SYNC(r5, 0x40086200, &(0x7f0000000040)=0x3) [ 1153.800432] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1153.821628] EXT4-fs (loop7): Invalid log block size: 16715520 03:46:52 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000000000000ffffff"}, &(0x7f0000000080)=0x1e) 03:46:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec0000000100080000fc000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:52 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0xd417]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1153.937266] gfs2: not a GFS2 filesystem [ 1153.951692] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1153.958120] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1153.966294] EXT4-fs (loop7): Invalid log block size: 16715520 [ 1154.102452] QAT: Invalid ioctl 03:46:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030a00ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:52 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec0000000100088cffffff0000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1154.144432] EXT4-fs (loop4): Test dummy encryption mode enabled 03:46:52 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x34000]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1154.225329] QAT: Invalid ioctl 03:46:52 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000904000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1154.248914] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:46:53 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) 03:46:53 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) pwrite64(r0, &(0x7f0000000240)="359f7e9dc7fc25cb4f7214efa2b516a3343ee91ccd9c934664f81d2973fb88dac53f4e659ff3b9f97cc0066c386b9409f9d9ebf5630da3937d48f350c95e1e70771d1b2f117bcec5ec0ec03a7223a40610c8a8e0b4df42f23225024bcbbe31cc6e7111fba45b07e66fe00784ef2869eb7cb22400d7bd2fca37af87df5db1b68f7968399be5e4b6d8e0eb9eb3aca84889b955aab0886751b1c4e8bf96cf6408adb987878daf114ca31908c91dbd0a93f1bde737a2df64a499c59924ae9a3a01e74ad8", 0xc2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000a0000000000e7ff00000000000000000000ffffac14142a0000000000000000000000000000000000000000000000000000000000001f0000000000000000000000000000000000000000000000000000001b000000000000000000000000000000000000000000000000000000000000000000000000007b4b00000000000000000000000000000000c04a9d7811a94ea9d2"], 0x90) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='net/if_inet6\x00') ioctl$UI_BEGIN_FF_ERASE(r2, 0xc00c55ca, &(0x7f0000000180)={0x0, 0x6, 0x2}) write$FUSE_OPEN(r2, &(0x7f0000000140)={0x20, 0x0, 0x6, {0x0, 0x4}}, 0x20) [ 1154.351205] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1154.370053] EXT4-fs (loop4): Invalid log block size: 64512 03:46:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00000000000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1154.402800] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1154.421985] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1154.467721] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:46:53 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0xfffffffffffff000]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1154.518782] EXT4-fs (loop7): Unsupported filesystem blocksize 0 (16777215 log_block_size) [ 1154.541932] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1154.553660] EXT4-fs (loop4): Test dummy encryption mode enabled 03:46:53 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) [ 1154.615928] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:46:53 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() rt_sigsuspend(&(0x7f0000000000)={0x3}, 0x8) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1154.691532] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1154.710971] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1154.718534] EXT4-fs (loop4): Invalid log block size: 64512 [ 1154.766916] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1154.781537] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:53 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x3f00000000000000]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:53 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000040)=r1, 0x12) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) write$P9_RREADDIR(r2, &(0x7f0000000080)={0x2a, 0x29, 0x1, {0x66, [{{0xe6, 0x3, 0x4}, 0x9, 0x31, 0x7, './file0'}]}}, 0x2a) recvfrom(r0, &(0x7f00000000c0)=""/248, 0xf8, 0x40, &(0x7f0000000240)=@un=@file={0x1, './file0\x00'}, 0x80) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000000a0000000000000000000000000000000000ffffac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000a004e24ff070000fe8000000000000000000000000000aa09000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e200200000000000000000000000000ffff7f000001ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000fe800000000000000000000000000021f7ffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e210200000000000000000000000000ffffac1414bbff030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2000000000ff01000000000000000000000000000106000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400f8ffffffffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x310) 03:46:53 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900050001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1154.831460] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1154.843126] EXT4-fs (loop7): Unsupported filesystem blocksize 0 (16777215 log_block_size) 03:46:53 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) [ 1154.970833] gfs2: not a GFS2 filesystem 03:46:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000000000000002002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030020ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:53 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000a0000000000000000000000000000000000ffffac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000160000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x90) 03:46:53 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008002100000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:53 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000000000200"}, &(0x7f0000000080)=0x1e) 03:46:53 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x9effffff00000000]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1155.194784] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1155.221752] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:46:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x48, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1155.273413] EXT4-fs (loop4): Invalid log cluster size: 33554432 03:46:54 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x1, &(0x7f0000000000)=0x80000001) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1155.338518] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1155.340536] EXT4-fs (loop1): Test dummy encryption mode enabled 03:46:54 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000000000500"}, &(0x7f0000000080)=0x1e) [ 1155.406871] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:46:54 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c00000009004c0001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1155.451926] EXT4-fs (loop7): Invalid log block size: 33 [ 1155.458271] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1155.477164] gfs2: not a GFS2 filesystem [ 1155.501690] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1155.510845] EXT4-fs (loop4): Test dummy encryption mode enabled 03:46:54 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0xf0ffffff]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1155.561949] gfs2: not a GFS2 filesystem [ 1155.568885] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:46:54 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl(r0, 0x4, &(0x7f0000000000)="d40441dd79195f3438c54aeb1813bdd007793f9b4bdfd8e7f884e14ed14d30651725591b3db9bacf2f222e119fb72ffefa6ab25b5d960c6b18b41903c00028d65bd6c2b90baee65c07390e3e34af710fe7986e353310cf747dfbcad70ec8c626e2f2868dfe7c4d1c2b4c7a9bf890") setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1155.632248] EXT4-fs (loop4): Invalid log cluster size: 33554432 03:46:54 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xe000000000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:54 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) [ 1155.685738] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1155.711583] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1155.719565] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:54 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008090000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec0000000100080000000000fffffffe002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:54 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0xf000]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030007ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:54 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c00000009000a0001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:54 executing program 2: r0 = socket$inet6(0xa, 0x2, 0xfffffffffffffffc) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000000)={0x10001, 0x37b}) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) socket$unix(0x1, 0x0, 0x0) fcntl$setown(r0, 0x8, r2) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:46:54 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) 03:46:54 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @remote}}, 0x0, 0x2af}, 0x90) [ 1156.200300] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1156.206782] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1156.220095] f2fs_msg: 110 callbacks suppressed [ 1156.220108] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1156.222500] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1156.224887] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1156.234534] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1156.260030] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1156.282956] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:55 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000000000000000400"}, &(0x7f0000000080)=0x1e) [ 1156.294396] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:55 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x17d4]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1156.344183] F2FS-fs (loop5): Invalid log blocks per segment (655369) [ 1156.344183] [ 1156.365022] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:55 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)=0x2000008000000000) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1156.390205] EXT4-fs (loop4): Invalid log cluster size: 4278190079 [ 1156.401485] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock [ 1156.411351] gfs2: not a GFS2 filesystem 03:46:55 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000000000000000100"}, &(0x7f0000000080)=0x1e) [ 1156.457009] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1156.528439] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1156.554404] EXT4-fs (loop7): Test dummy encryption mode enabled 03:46:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030074ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000000000000007002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1156.609890] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1156.617539] F2FS-fs (loop5): Invalid log blocks per segment (655369) [ 1156.617539] [ 1156.700244] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1156.709228] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock 03:46:55 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffff1f00, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:55 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0xf0ffffff00000000]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:55 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000000000002000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:55 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000000)={0x7ff, 0xc, 0x6, 0x8, 0x0}, &(0x7f0000000040)=0x10) unshare(0x200) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={r2, @in6={{0xa, 0x4e20, 0x2, @loopback, 0x80000001}}, 0x0, 0xff}, 0x90) 03:46:55 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000000000300"}, &(0x7f0000000080)=0x1e) [ 1156.836390] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1156.843799] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1156.859058] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1156.904810] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1156.922984] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:46:55 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x9, 0x88d00) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e24, @loopback}}, 0x1, 0x1, 0x7, 0x80000001, 0x6}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000000240)={0x0, 0xcd, "0aaa34d7ba3c106fcd36554c40c09a48a872ffb026a54220fc505d165e46af2537d96cf31aea2e03e0f71034490c4d4b3640fa1a601df9086fd5b9b34251949bb7cb3ec229bd68c88cf5c216c6f2d33811348f2bc36ebd69f862ad53b8fdd5bd75498e3861623f19d86c2199c053059a15cb7c13e82429ac090a12b4de29c00de9c765073dd8f0da138ea784c2570ca099e0cda1857ba49b5ca5525c76e41cf8d60c8c0bac882456f4972c41103a7ee73205b11603e72aa465fdfe1360e5dea642be47d0d8e7c3f8a5658cf0e4"}, &(0x7f0000000140)=0xd5) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000001c0)={0x5}, 0x4) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f00000003c0)={r3, 0x8, 0x8, 0x7, 0xffffffff0000000, 0x1, 0xffffffffffffffff, 0x800, {r4, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @broadcast}, 0x7}}, 0x10001, 0x96e7, 0x0, 0xade, 0x3f}}, &(0x7f0000000180)=0xb0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000a0000000000001e00000000000000000000ffffac1414aa00000000000000de03000000000000000000a9ae76812ba719000000000000b6ca0000ecff000000000000000000000010000000000000fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x90) 03:46:55 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0xf000000]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:55 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c000000090000042c000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:55 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000000000000000500"}, &(0x7f0000000080)=0x1e) [ 1156.959462] EXT4-fs (loop4): Invalid log cluster size: 117440512 [ 1156.975382] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1157.080059] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1157.135363] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1157.145889] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1157.155833] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1157.188303] EXT4-fs (loop7): Invalid log cluster size: 2097152 [ 1157.220390] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1157.247955] gfs2: not a GFS2 filesystem 03:46:55 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x10001, 0x80000) fcntl$getownex(r1, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sched_setscheduler(r2, 0x2, &(0x7f0000000180)=0x180000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r3 = getpid() ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f00000005c0)=0x9) chmod(&(0x7f00000001c0)='./file0\x00', 0x10) sched_setscheduler(r3, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000a0000000000000000000000000000000000ffffac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000ab54ba8a5f3b000081000000000000"], 0x90) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000040)={[{0xf4, 0x9, 0x1f, 0x1, 0x8, 0x7f, 0x81, 0x3, 0x30000000000, 0xa4, 0x2, 0x9, 0x80000001}, {0x6, 0x3, 0x1, 0x1, 0x401, 0x7f, 0x4, 0xffff, 0x8, 0x6, 0x2, 0x8, 0x4}, {0x615, 0xe7d7, 0x6, 0x9, 0x5, 0x6, 0x1, 0xaa57, 0x7, 0x0, 0x80, 0x1f, 0x1}]}) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000340)={0xa, 0x4, 0x9, 0x200}, 0xa) sendto(r1, &(0x7f00000000c0), 0x0, 0x40000, &(0x7f0000000100)=@nl=@kern={0x10, 0x0, 0x0, 0x1000}, 0x80) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000240)={0x0, 0x1, {0x1d, 0x23, 0x16, 0x2, 0x3, 0x3f, 0x0, 0x87, 0x1}}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {&(0x7f00000003c0), r4, 0x3}}, 0x18) 03:46:55 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000000000000000600"}, &(0x7f0000000080)=0x1e) [ 1157.273035] EXT4-fs (loop4): Invalid log cluster size: 117440512 [ 1157.285695] EXT4-fs (loop1): Test dummy encryption mode enabled 03:46:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000000000000400002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1157.324908] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1157.363757] EXT4-fs (loop7): Test dummy encryption mode enabled 03:46:56 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0xa00]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1157.425976] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1157.458953] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:46:56 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c00000009000001d4000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1157.588867] EXT4-fs (loop7): Invalid log cluster size: 2097152 [ 1157.640232] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1157.665562] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:46:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030c7cec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:56 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) 03:46:56 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x521041, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000000c0)=0x181) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000a0000000000000000000000000000000000ffffac1414aa00000000000000000000000000000000000000000000000000000000000000000000004fb80392fc495557000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0700000001000000000000"], 0x90) unlink(&(0x7f0000000000)='./file0\x00') 03:46:56 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xebffffff, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:56 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008070000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:56 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0xd4170000]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1157.766452] EXT4-fs (loop4): Invalid log cluster size: 262144 03:46:56 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000000000600"}, &(0x7f0000000080)=0x1e) [ 1157.875243] EXT4-fs (loop1): Test dummy encryption mode enabled 03:46:56 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:46:56 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000903000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1157.952095] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1157.963715] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1158.005833] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:46:56 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000000000500"}, &(0x7f0000000080)=0x1e) [ 1158.057722] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1158.061066] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:56 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x100000000, 0x1) ioctl$SG_GET_TIMEOUT(r1, 0x2202, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/63, 0x3f) [ 1158.100201] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1158.128524] EXT4-fs (loop4): Invalid log cluster size: 262144 [ 1158.155814] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:56 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0xa]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1158.221558] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1158.283967] gfs2: not a GFS2 filesystem 03:46:57 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) 03:46:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000006000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:57 executing program 2: r0 = socket$inet6(0xa, 0x100000004, 0x1000000000000001) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) socket$l2tp(0x18, 0x1, 0x1) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000a0000030000000000000020000000000000ffffac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008b1c326987649385b3f2589f770017f94d"], 0x90) [ 1158.310817] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1158.318335] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:57 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x3]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c903007aec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:57 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec0000000100080000000a0000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:57 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900140001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1158.582221] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1158.583619] EXT4-fs (loop1): Test dummy encryption mode enabled 03:46:57 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf801, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:57 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) [ 1158.622921] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1158.627631] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1158.680522] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:46:57 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0xa00000000000000]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1158.754887] EXT4-fs (loop4): Invalid log block size: 1536 03:46:57 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000), &(0x7f0000000040)=0x4) 03:46:57 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000000000400"}, &(0x7f0000000080)=0x1e) [ 1158.830155] EXT4-fs (loop7): Invalid log block size: 655360 [ 1158.836222] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1158.865458] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:57 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900000002000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:57 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) r1 = getpid() r2 = creat(&(0x7f0000000000)='./file0\x00', 0x100) bind$nfc_llcp(r2, &(0x7f0000000040)={0x27, 0x1, 0x0, 0x7, 0x8001, 0x800, "16f0e1bb30ef4b656d1fe2f96646d01e1acc52ce7de336e0ae5b27f667e5ccf893c955bdc67be4b5751b6b5a41442ce6dad46dd45adca4f41a40b3785f7ce2", 0x7}, 0x60) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) listen(r2, 0x5) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000a0000000000000000000000000000000000ffffac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000797b0000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000"], 0x90) [ 1159.008157] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1159.013892] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1159.022503] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:46:57 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000000000000000200"}, &(0x7f0000000080)=0x1e) [ 1159.080475] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1159.101867] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1159.102998] EXT4-fs (loop4): Invalid log block size: 1536 [ 1159.120475] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:57 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0xf00000000000000]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1159.128175] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1159.160385] EXT4-fs (loop7): Invalid log block size: 655360 03:46:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000800ebffffff00000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:57 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = fcntl$getown(r0, 0x9) migrate_pages(r1, 0x80000001, &(0x7f0000000000)=0x6, &(0x7f0000000040)=0x9) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:46:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c903e000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:57 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000000000400"}, &(0x7f0000000080)=0x1e) 03:46:57 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000800000000fffffffe00002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1159.332735] gfs2: not a GFS2 filesystem [ 1159.417888] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1159.436507] EXT4-fs (loop7): Test dummy encryption mode enabled 03:46:58 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000a0000008b00000000000000000000000000ffffac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cc9b75b1b45b11f23ab202cb9f408e7900000000000000000000000000000000000000"], 0x90) [ 1159.458234] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1159.470729] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:46:58 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0xfffff000]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1159.511306] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1159.528279] EXT4-fs (loop4): Unsupported filesystem blocksize 2097152 (-21 log_block_size) [ 1159.538680] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1159.549260] EXT4-fs (loop7): Invalid log block size: 4278190080 03:46:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x9, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:58 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) 03:46:58 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900000053000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1159.564007] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1159.656688] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1159.665780] EXT4-fs (loop1): Test dummy encryption mode enabled 03:46:58 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x0, r1}) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1159.728660] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1159.748828] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1159.759559] EXT4-fs (loop7): Test dummy encryption mode enabled 03:46:58 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x2000000]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1159.781982] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1159.787071] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1159.799503] EXT4-fs (loop7): Invalid log block size: 4278190080 [ 1159.808454] EXT4-fs (loop4): Unsupported filesystem blocksize 2097152 (-21 log_block_size) [ 1159.843566] gfs2: not a GFS2 filesystem 03:46:58 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900000040000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030fffec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:58 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) 03:46:58 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() fcntl$addseals(r0, 0x409, 0x8) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000a00000000e612ff777f7848dd0000000000ffffac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x90) 03:46:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000800fffffff600000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:58 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec0000000100080000003f0000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:58 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0xf0]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:58 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$inet6(0xa, 0x80006, 0x10000) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1160.142621] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1160.148974] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1160.181987] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1160.206643] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1160.239850] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1160.247536] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:46:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:46:58 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) [ 1160.260068] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1160.287649] EXT4-fs (loop7): Invalid log block size: 4128768 03:46:59 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) socket$inet6(0xa, 0x80000, 0x1f) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:46:59 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c000000090000004e000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:46:59 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0xf]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1160.368531] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (-150994945 log_block_size) 03:46:59 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) [ 1160.499240] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1160.532923] EXT4-fs (loop4): Test dummy encryption mode enabled 03:46:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9032d00ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:46:59 executing program 2: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$getregs(0xc, r0, 0x5e4, &(0x7f0000000040)=""/91) r1 = socket$inet6(0xa, 0x2, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) shutdown(r1, 0x1) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1160.572680] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1160.611075] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1160.627417] EXT4-fs (loop7): Invalid log block size: 4128768 03:46:59 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000000000600"}, &(0x7f0000000080)=0x1e) [ 1160.690329] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (-150994945 log_block_size) 03:46:59 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0xffffff9e]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:46:59 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008fffffffe0000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1160.760241] EXT4-fs (loop1): Test dummy encryption mode enabled 03:46:59 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900480001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1160.811582] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 03:46:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000000000000020002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1160.870299] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1160.931398] gfs2: not a GFS2 filesystem [ 1160.980481] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1161.005181] EXT4-fs (loop1): Test dummy encryption mode enabled 03:46:59 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) [ 1161.055503] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1161.063397] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1161.084782] EXT4-fs (loop7): Unsupported filesystem blocksize 0 (16711679 log_block_size) 03:46:59 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x2]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1161.115059] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1161.122827] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:46:59 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x900, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1161.174096] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1161.236057] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1161.248230] EXT4-fs (loop4): Invalid log cluster size: 536870912 03:46:59 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c000000090fff0001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:47:00 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000000000000000200"}, &(0x7f0000000080)=0x1e) [ 1161.358883] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1161.387635] EXT4-fs (loop4): Test dummy encryption mode enabled 03:47:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030900ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:47:00 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0xd417000000000000]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1161.413160] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1161.430526] EXT4-fs (loop7): Unsupported filesystem blocksize 0 (16711679 log_block_size) 03:47:00 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000000000500"}, &(0x7f0000000080)=0x1e) [ 1161.487280] EXT4-fs (loop4): Invalid log cluster size: 536870912 03:47:00 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008ffff1f000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:47:00 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x9, 0x40000) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={0x0, r2, 0x0, 0x2}, 0x14) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000000004000080000000000000000000000000000000ffffac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000591cba174e95d5a7722c90b2b08ebfdeb3ad5069897e2d33c6a8bc0d6d2099aae28c98baae5c54b46b5c2c05b86a1f625b4ee145600700111d2a4ff4c04581306df6b98d323e02a5ad5dfb4e4c4429cbe379aff018c8168573367b354d078bc7f1c821a69a3468068bd11a18ddf938adfba5bc1e2b6ea8e3f1db06b6d9e4d1fdfd8ec275dcc6737e3a09fa0d244e6df4135a0f8346abf87e31f2d53eb9a73eabefbe9b46d49b10d10d6c674db406e9809a6f195fab59b2eb9b32150cfc36fa1bd242fe21cda33724ac7e6c758d8b8055225119dd2e06564f67b5416e50234d96f9824d8d45b94b182fa20d4d6dfef7b9fa1e9b04b17eeaeb3a23fef9ffa60d572b4b4c089359e9285d21c386d36d702f29570872183e2aedb83dc47998ad861da7756c185ad1ec33b981ca7b54"], 0x90) 03:47:00 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0xffffff7f]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1161.580426] f2fs_msg: 118 callbacks suppressed [ 1161.580440] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1161.602880] gfs2: not a GFS2 filesystem 03:47:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec0000000100080000000000fffffff6002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:47:00 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) [ 1161.684184] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1161.700042] F2FS-fs (loop5): Invalid log blocks per segment (16715529) [ 1161.700042] [ 1161.716071] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1161.779999] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1161.787726] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock [ 1161.832114] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1161.870659] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1161.882362] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1161.888459] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1161.898807] EXT4-fs (loop4): Test dummy encryption mode enabled 03:47:00 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x800) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000240)={0xffff, 0x1000}) r1 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) r2 = getpid() ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000300)={{0xac9c, 0xa570}, "706f7274302aeac7cda3f1953a00", 0x12, 0x21011, 0x2, 0xde, 0x8, 0x7, 0xeb8, 0x0, 0x7, 0x2}) sched_setscheduler(r2, 0x5, &(0x7f0000000200)) r3 = accept$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000180)=@int=0x7, 0x4) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000001800)=ANY=[@ANYBLOB="0000000000000000000000ffffac1414aa000000000000000000000000000000000000000000000000170000000000000000000000000000000000003300000000000000000000000000000015000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x90) ioctl(r1, 0x401, &(0x7f0000000000)="685713ecb916d935cef455f81557b67eae43ecbbd0575b5c37aec3ffb10b40461d256248077b1975aa320641cca78b786f592151318a74e0864dd65a9d04a44eb99a8546d25c81294646ff7e69edf2aa379786b82a7e8cfabbbe1e9dce363a1140ba3104b4b8f6685ac0ebafb7a8da643d91ba25946368d51f4706d77894738a0a8f4f749c425c45f5290f389adf7358d7c0994d407b82480fe69394eace16f6b4681a45051656fb25097b10639713ae51fc25de78ff8a02757a8e6b662d55dc0ec306acefd115652a2e5ec160e1de7161401ea0b0bbed7ec19d6e19635029f5a414ca") [ 1161.927845] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1161.946115] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:47:00 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x1000000]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:47:00 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1161.998456] EXT4-fs (loop4): Invalid log cluster size: 4143972351 [ 1162.019402] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1162.033880] F2FS-fs (loop5): Invalid log blocks per segment (16715529) [ 1162.033880] 03:47:00 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) [ 1162.071542] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1162.089838] EXT4-fs (loop7): Unsupported filesystem blocksize 0 (8191 log_block_size) [ 1162.106835] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock [ 1162.145510] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) 03:47:00 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000040)={0x8000, 0x6cf, 0xd62, 0x3, 0x9, 0xcc44029}) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000a0000000000000000000000000000000000ffffac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f5ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x90) 03:47:00 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) [ 1162.263974] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1162.291368] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1162.351061] gfs2: not a GFS2 filesystem [ 1162.428735] gfs2: not a GFS2 filesystem 03:47:01 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900000400000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:47:01 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x200000000000000]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:47:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9034c00ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:47:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000800000000007fffffff002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:47:01 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000000000002300002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:47:01 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:47:01 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000000000000000600"}, &(0x7f0000000080)=0x1e) 03:47:01 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x500000000000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1162.575702] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1162.589995] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1162.605353] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1162.615206] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 03:47:01 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000180)={0x0, 0x9, 0x2, [0x971c, 0x8]}, &(0x7f00000001c0)=0xc) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000240)={r3, 0x401}, 0x8) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000040)) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000300)={0xa, &(0x7f0000000280)=[{}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_LOCK(r1, 0x4008642a, &(0x7f0000000340)={r4, 0x4}) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000000000e2090000000000000000000000000000000000ffffac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000170000000000000000ff0000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000f72d64af736bb614e6fb40c207577a9db4d40246fa6c9a1a55b00ddea604c9cd40a8993723a08d3f1a000dfa068f835380347e30e1f06351"], 0x90) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) [ 1162.624780] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1162.646442] EXT4-fs (loop4): Invalid log cluster size: 4294967167 03:47:01 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x9effffff]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1162.736278] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1162.757268] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:47:01 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000000000200"}, &(0x7f0000000080)=0x1e) [ 1162.781254] EXT4-fs (loop7): Invalid log cluster size: 2293760 [ 1162.792473] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1162.800022] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1162.864582] EXT4-fs (loop4): Invalid log cluster size: 4294967167 03:47:01 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c000000090000039b000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:47:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9037400ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:47:01 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x90) 03:47:01 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000000000000000000ffff"}, &(0x7f0000000080)=0x1e) 03:47:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000004000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:47:01 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008fc0000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1163.105273] gfs2: not a GFS2 filesystem 03:47:01 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x40030000000000]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1163.168641] [ 1163.169966] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1163.170296] ====================================================== [ 1163.170300] WARNING: possible circular locking dependency detected [ 1163.170308] 4.19.0-rc2+ #5 Not tainted [ 1163.170321] ------------------------------------------------------ [ 1163.170333] kswapd0/1375 is trying to acquire lock: [ 1163.170344] 00000000d801d905 [ 1163.178902] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1163.183040] (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 1163.183068] [ 1163.183068] but task is already holding lock: [ 1163.183072] 00000000645194c3 (fs_reclaim){+.+.}, at: __fs_reclaim_acquire+0x0/0x30 [ 1163.183098] [ 1163.183098] which lock already depends on the new lock. [ 1163.183098] [ 1163.183101] [ 1163.183101] the existing dependency chain (in reverse order) is: [ 1163.183105] [ 1163.183105] -> #3 (fs_reclaim){+.+.}: [ 1163.183134] fs_reclaim_acquire.part.97+0x24/0x30 [ 1163.203113] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1163.204640] fs_reclaim_acquire+0x14/0x20 [ 1163.204655] kmem_cache_alloc_trace+0x2d/0x750 [ 1163.204670] smk_fetch.part.24+0x5a/0xf0 [ 1163.204687] smack_d_instantiate+0x94e/0xea0 [ 1163.207809] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1163.217131] security_d_instantiate+0x5c/0xf0 [ 1163.217160] d_instantiate+0x5e/0xa0 [ 1163.217172] shmem_mknod+0x189/0x1f0 [ 1163.217182] vfs_mknod+0x445/0x800 [ 1163.217195] handle_create+0x1ff/0x730 [ 1163.217210] devtmpfsd+0x27f/0x4c0 [ 1163.237321] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1163.245579] kthread+0x35a/0x420 [ 1163.245617] ret_from_fork+0x3a/0x50 [ 1163.245622] [ 1163.245622] -> #2 ( [ 1163.255346] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1163.258532] &isp->smk_lock){+.+.}: [ 1163.258556] __mutex_lock+0x166/0x1710 [ 1163.258570] mutex_lock_nested+0x16/0x20 [ 1163.258585] smack_d_instantiate+0x136/0xea0 [ 1163.258603] security_d_instantiate+0x5c/0xf0 [ 1163.264524] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1163.270389] d_instantiate_new+0x70/0x160 [ 1163.270404] ext4_add_nondir+0x81/0x90 [ 1163.270416] ext4_symlink+0x752/0x1130 [ 1163.270427] vfs_symlink+0x37a/0x5d0 [ 1163.270437] do_symlinkat+0x242/0x2d0 [ 1163.270454] __x64_sys_symlink+0x59/0x80 [ 1163.276594] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1163.280200] do_syscall_64+0x1b9/0x820 [ 1163.280214] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1163.280218] [ 1163.280218] -> #1 (jbd2_handle){++++}: [ 1163.280260] start_this_handle+0x5b8/0x1250 [ 1163.280273] jbd2__journal_start+0x3c9/0xa90 [ 1163.280285] __ext4_journal_start_sb+0x1a5/0x5f0 [ 1163.280304] ext4_file_open+0x53e/0x730 [ 1163.300089] kobject: 'loop0' (000000006545f760): kobject_uevent_env [ 1163.304237] do_dentry_open+0x499/0x1250 [ 1163.304249] vfs_open+0xa0/0xd0 [ 1163.304260] path_openat+0x12bf/0x5160 [ 1163.304276] do_filp_open+0x255/0x380 [ 1163.313336] kobject: 'loop0' (000000006545f760): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1163.316796] do_open_execat+0x221/0x8e0 [ 1163.316811] __do_execve_file.isra.33+0x173f/0x2540 [ 1163.316822] __x64_sys_execve+0x8f/0xc0 [ 1163.316836] do_syscall_64+0x1b9/0x820 [ 1163.316850] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1163.316854] [ 1163.316854] -> #0 ( [ 1163.359210] kobject: 'loop0' (000000006545f760): kobject_uevent_env [ 1163.362364] sb_internal){.+.+}: [ 1163.362389] lock_acquire+0x1ed/0x520 [ 1163.362407] __sb_start_write+0x214/0x370 [ 1163.371399] kobject: 'loop0' (000000006545f760): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1163.372356] ext4_evict_inode+0x5e5/0x1ad0 [ 1163.372368] evict+0x4b9/0x980 [ 1163.372379] iput+0x679/0xa90 [ 1163.372392] dentry_unlink_inode+0x461/0x5e0 [ 1163.372405] __dentry_kill+0x44c/0x7a0 [ 1163.372417] dentry_kill+0xc9/0x5a0 [ 1163.372435] shrink_dentry_list+0x379/0x800 [ 1163.572742] prune_dcache_sb+0x12f/0x1c0 [ 1163.577351] super_cache_scan+0x270/0x480 [ 1163.582035] do_shrink_slab+0x4cf/0xd00 [ 1163.586537] shrink_slab+0x6f9/0x8c0 [ 1163.590777] shrink_node+0x431/0x16b0 [ 1163.595104] balance_pgdat+0x7ca/0x1000 [ 1163.599606] kswapd+0x857/0x12d0 [ 1163.603507] kthread+0x35a/0x420 [ 1163.607406] ret_from_fork+0x3a/0x50 [ 1163.611633] [ 1163.611633] other info that might help us debug this: [ 1163.611633] [ 1163.619782] Chain exists of: [ 1163.619782] sb_internal --> &isp->smk_lock --> fs_reclaim [ 1163.619782] [ 1163.629685] kobject: 'loop3' (00000000d053dc44): kobject_uevent_env [ 1163.629861] Possible unsafe locking scenario: [ 1163.629861] [ 1163.629865] CPU0 CPU1 [ 1163.629867] ---- ---- [ 1163.629869] lock(fs_reclaim); [ 1163.629877] lock(&isp->smk_lock); [ 1163.629885] lock(fs_reclaim); [ 1163.629900] lock( [ 1163.636548] kobject: 'loop3' (00000000d053dc44): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1163.642459] sb_internal); [ 1163.642465] [ 1163.642465] *** DEADLOCK *** [ 1163.642465] [ 1163.642473] 3 locks held by kswapd0/1375: [ 1163.642477] #0: 00000000645194c3 (fs_reclaim){+.+.}, at: __fs_reclaim_acquire+0x0/0x30 [ 1163.642511] #1: 0000000018dd9ac5 (shrinker_rwsem){++++}, at: shrink_slab+0x1d1/0x8c0 [ 1163.642543] #2: 00000000322805ef (&type->s_umount_key#29){++++}, at: trylock_super+0x22/0x110 [ 1163.716589] [ 1163.716589] stack backtrace: [ 1163.721093] CPU: 0 PID: 1375 Comm: kswapd0 Not tainted 4.19.0-rc2+ #5 [ 1163.727670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1163.737022] Call Trace: [ 1163.739637] dump_stack+0x1c4/0x2b4 [ 1163.743284] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1163.748495] ? vprintk_func+0x85/0x181 [ 1163.752395] print_circular_bug.isra.33.cold.54+0x1bd/0x27d [ 1163.758113] __lock_acquire+0x33e4/0x4ec0 [ 1163.762796] ? mark_held_locks+0x130/0x130 [ 1163.767044] ? print_usage_bug+0xc0/0xc0 [ 1163.771137] ? print_usage_bug+0xc0/0xc0 [ 1163.775205] ? zap_class+0x640/0x640 [ 1163.778927] ? __lock_acquire+0x7ec/0x4ec0 [ 1163.783427] ? __lock_acquire+0x7ec/0x4ec0 [ 1163.787669] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1163.793219] ? check_preemption_disabled+0x48/0x200 [ 1163.798249] ? mark_held_locks+0x130/0x130 [ 1163.802490] ? zap_class+0x640/0x640 [ 1163.806208] ? __lock_acquire+0x7ec/0x4ec0 [ 1163.810451] ? print_usage_bug+0xc0/0xc0 [ 1163.814522] ? graph_lock+0x170/0x170 [ 1163.818360] ? __lock_is_held+0xb5/0x140 [ 1163.822447] lock_acquire+0x1ed/0x520 [ 1163.826263] ? ext4_evict_inode+0x5e5/0x1ad0 [ 1163.830690] ? lock_release+0x970/0x970 [ 1163.834674] ? arch_local_save_flags+0x40/0x40 [ 1163.839285] ? __lock_is_held+0xb5/0x140 [ 1163.843374] __sb_start_write+0x214/0x370 [ 1163.847531] ? ext4_evict_inode+0x5e5/0x1ad0 [ 1163.851961] ext4_evict_inode+0x5e5/0x1ad0 [ 1163.856199] ? find_held_lock+0x36/0x1c0 [ 1163.860269] ? ext4_da_write_begin+0x12c0/0x12c0 [ 1163.865030] ? inode_wait_for_writeback+0x2f/0x40 [ 1163.869990] ? lock_downgrade+0x900/0x900 [ 1163.874159] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1163.879717] ? __inode_wait_for_writeback+0x2cf/0x380 [ 1163.883883] kobject: 'loop1' (000000008801102d): kobject_uevent_env [ 1163.885025] ? kasan_check_read+0x11/0x20 [ 1163.885041] ? do_raw_spin_unlock+0xa7/0x2f0 [ 1163.885056] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 1163.885071] ? kasan_check_write+0x14/0x20 [ 1163.885089] ? do_raw_spin_lock+0xc1/0x200 [ 1163.895094] kobject: 'loop1' (000000008801102d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1163.896388] ? ext4_da_write_begin+0x12c0/0x12c0 [ 1163.896403] evict+0x4b9/0x980 [ 1163.896418] ? destroy_inode+0x200/0x200 [ 1163.896431] ? iput+0x671/0xa90 [ 1163.896448] ? lock_downgrade+0x900/0x900 [ 1163.942801] ? kasan_check_read+0x11/0x20 [ 1163.946959] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 1163.951553] iput+0x679/0xa90 [ 1163.954670] ? inode_add_lru+0x2a0/0x2a0 [ 1163.958742] ? fsnotify_destroy_marks+0x2e7/0x5c0 [ 1163.963593] ? kasan_check_read+0x11/0x20 [ 1163.967747] ? do_raw_spin_unlock+0xa7/0x2f0 [ 1163.972159] ? fsnotify_clear_marks_by_group+0x640/0x640 [ 1163.977619] ? find_held_lock+0x36/0x1c0 [ 1163.981699] dentry_unlink_inode+0x461/0x5e0 [ 1163.986116] ? d_lru_add+0x120/0x120 [ 1163.989836] ? kasan_check_read+0x11/0x20 [ 1163.993991] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 1163.998585] ? lockref_get_not_dead+0x90/0x90 [ 1164.003092] __dentry_kill+0x44c/0x7a0 [ 1164.006986] ? d_drop+0x70/0x70 [ 1164.010267] ? do_raw_spin_trylock+0x11c/0x1c0 [ 1164.014875] ? do_raw_spin_lock+0x200/0x200 [ 1164.019198] ? d_drop+0x70/0x70 [ 1164.022487] dentry_kill+0xc9/0x5a0 [ 1164.026134] shrink_dentry_list+0x379/0x800 [ 1164.030464] ? is_subdir+0x4a0/0x4a0 [ 1164.033596] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1164.034181] ? _raw_spin_unlock+0x2c/0x50 [ 1164.034195] ? list_lru_walk_one+0xb0/0xe0 [ 1164.034211] prune_dcache_sb+0x12f/0x1c0 [ 1164.043031] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1164.044759] ? list_lru_count_one+0x282/0x450 [ 1164.044772] ? proc_nr_dentry+0x260/0x260 [ 1164.044789] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1164.044810] super_cache_scan+0x270/0x480 [ 1164.080795] do_shrink_slab+0x4cf/0xd00 [ 1164.084776] ? snapshot_refaults+0x290/0x290 [ 1164.089237] ? __radix_tree_insert+0x8f0/0x8f0 [ 1164.093822] ? shrink_slab+0x1d1/0x8c0 [ 1164.097725] ? downgrade_write+0x2b0/0x2b0 [ 1164.101968] ? shrink_node_memcg+0xc82/0x18e0 [ 1164.106498] ? radix_tree_lookup+0x21/0x30 [ 1164.110747] shrink_slab+0x6f9/0x8c0 [ 1164.114466] ? unregister_memcg_shrinker.isra.43+0x50/0x50 [ 1164.120101] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1164.125558] ? debug_smp_processor_id+0x1c/0x20 [ 1164.130238] ? __zone_watermark_ok+0x330/0x7b0 [ 1164.134856] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1164.140422] shrink_node+0x431/0x16b0 [ 1164.144230] ? mem_cgroup_split_huge_fixup+0x1b0/0x1b0 [ 1164.149521] ? shrink_node_memcg+0x18e0/0x18e0 [ 1164.154110] ? zone_watermark_ok_safe+0x146/0x3f0 [ 1164.158969] ? lock_acquire+0x1ed/0x520 [ 1164.162965] ? __alloc_pages_direct_compact+0x350/0x350 [ 1164.168361] ? lock_release+0x970/0x970 [ 1164.172355] ? arch_local_save_flags+0x40/0x40 [ 1164.176943] ? __sched_text_start+0x8/0x8 [ 1164.181100] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1164.186638] ? pgdat_balanced+0x110/0x140 [ 1164.190813] balance_pgdat+0x7ca/0x1000 [ 1164.194798] ? mem_cgroup_shrink_node+0xb60/0xb60 [ 1164.199657] ? rcu_lockdep_current_cpu_online+0x1f0/0x2d0 [ 1164.205198] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1164.210484] ? rcu_pm_notify+0xc0/0xc0 [ 1164.214378] kswapd+0x857/0x12d0 [ 1164.217774] ? balance_pgdat+0x1000/0x1000 [ 1164.222047] ? finish_wait+0x430/0x430 [ 1164.225953] ? find_held_lock+0x36/0x1c0 [ 1164.230023] ? __kthread_parkme+0xce/0x1a0 [ 1164.234267] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1164.239453] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1164.244577] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1164.249163] ? trace_hardirqs_on+0xbd/0x310 [ 1164.253492] ? kasan_check_read+0x11/0x20 [ 1164.257648] ? __kthread_parkme+0xce/0x1a0 [ 1164.261890] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1164.267361] ? kasan_check_write+0x14/0x20 03:47:02 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x3000000]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:47:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x80000001, 0x4000) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f00000000c0)={'NETMAP\x00'}, &(0x7f0000000100)=0x1e) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400000, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000140)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000040)={0xfffffffffffff979, 0x1, 0x9, @random="b013a908ee71", 'tunl0\x00'}) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000680)={0x0, @in6={{0xa, 0x4e20, 0x7, @local, 0x8}}, 0xf1, 0x93d, 0x9, 0x1, 0x14}, &(0x7f0000000180)=0x98) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f00000001c0)={r3, 0x8000}, 0x8) r4 = getpid() sched_setscheduler(r4, 0x0, &(0x7f0000000200)=0x80000001) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f0000000240)=ANY=[@ANYBLOB="0500000000000000000000c0090000000500000000000000010000000104000000000000000000000000000000000000040000eed90005000000060000007f00000007000000000000000180000000000000000000000000000002000000e80b000004000000000000000000010004000000000000fdffffff000000000000000000190000c0ccbc000006000000d80f000000000000380f00000300000000000000000000000000000000000000008000000400000005000000010000000800000006000075fd4f0000000000000000"]) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000003c0)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}, 0x11}}, 0x0, 0x4, [{{0xa, 0x4e21, 0x42c, @remote, 0x31f00000000000}}, {{0xa, 0x4e20, 0xff, @dev={0xfe, 0x80, [], 0x1f}, 0x5}}, {{0xa, 0x4e23, 0xfd61, @empty, 0x7ff}}, {{0xa, 0x4e20, 0x2, @remote, 0x8001}}]}, 0x290) [ 1164.271601] ? do_raw_spin_lock+0xc1/0x200 [ 1164.275847] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1164.280956] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1164.286503] ? __kthread_parkme+0xfb/0x1a0 [ 1164.290749] kthread+0x35a/0x420 [ 1164.294136] ? balance_pgdat+0x1000/0x1000 [ 1164.298374] ? kthread_bind+0x40/0x40 [ 1164.302184] ret_from_fork+0x3a/0x50 03:47:03 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) [ 1164.392799] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1164.393023] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1164.398922] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1164.398940] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1164.405507] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1164.429971] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 03:47:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7400, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1164.442760] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1164.450266] EXT4-fs (loop7): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1164.460339] EXT4-fs (loop4): Invalid log block size: 1073741824 [ 1164.470352] kobject: 'loop1' (000000008801102d): kobject_uevent_env [ 1164.483820] kobject: 'loop1' (000000008801102d): fill_kobj_path: path = '/devices/virtual/block/loop1' 03:47:03 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0xf0ffff]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:47:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c903ffe0ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:47:03 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c00000009000003ba000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1164.520808] kobject: 'loop5' (000000009d5e043a): kobject_uevent_env [ 1164.530067] kobject: 'loop5' (000000009d5e043a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1164.555094] kobject: 'loop2' (00000000275c0945): kobject_uevent_env [ 1164.580438] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1164.580989] kobject: 'loop2' (00000000275c0945): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1164.586965] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1164.616749] kobject: 'loop6' (00000000149961af): kobject_uevent_env 03:47:03 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) 03:47:03 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000800000000ffffffff00002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1164.644626] kobject: 'loop6' (00000000149961af): fill_kobj_path: path = '/devices/virtual/block/loop6' [ 1164.679880] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1164.692770] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1164.714287] kobject: 'loop0' (000000006545f760): kobject_uevent_env 03:47:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000000900000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1164.740544] kobject: 'loop0' (000000006545f760): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1164.750610] kobject: 'loop3' (00000000d053dc44): kobject_uevent_env [ 1164.757050] kobject: 'loop3' (00000000d053dc44): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1164.784471] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env 03:47:03 executing program 2: lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0x73, 0x0, 0x517, "aa40b25aea8ee57dd8df8b6c832fdaf8", "960dfc7d352dcf2c6c0c0661d1d80b09af03debabf0b15af8e5d21bcc26c8dcf0f928965c07d84d82ede518e2512b257429068da96ee14fda9e18a2cf8e9b3f97a6b6d2bae39c55fb69e53cb8bbe8c7f76e41222511d62711bda2a013a3a"}, 0x73, 0x2) r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x924, 0x240) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000000040)={r0, 0x1, 0x6, "ac7023fcc7190d231b1dff62d32d72144f92cfc8fb470092cd9e51e116de5a06fe7c2fbcf79557b6b3255073a9efef47095d872b7cb5e3d1656aa41788fa196060505898bd1761d082db0750d7f7fabcecd819dc2c4a5c9c271ebf2dc60dc9a2452bd358ab7a9bc90eaf926f9f9a58ac9382e30eed3003adedbb55f2bd81237cac7e"}) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000a0000000000000000000000000000000000ffffac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x90) [ 1164.796094] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1164.820590] kobject: 'loop1' (000000008801102d): kobject_uevent_env [ 1164.830610] kobject: 'loop5' (000000009d5e043a): kobject_uevent_env 03:47:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) getpid() setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1164.845774] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1164.858252] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1164.869756] kobject: 'loop1' (000000008801102d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1164.878696] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' 03:47:03 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) [ 1164.883469] kobject: 'loop5' (000000009d5e043a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1164.894338] kobject: 'loop3' (00000000d053dc44): kobject_uevent_env [ 1164.910507] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1164.935103] kobject: 'loop3' (00000000d053dc44): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:47:03 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x0, 0xf]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1164.953715] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1164.967401] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1164.977300] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1164.979845] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1164.992568] kobject: 'loop2' (00000000275c0945): kobject_uevent_env 03:47:03 executing program 2: r0 = socket$inet6(0xa, 0xb, 0x8000000000000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000080)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r3 = getpid() mknod$loop(&(0x7f0000000180)='./file0\x00', 0x1, 0x1) ioctl$void(r0, 0xc004587f) sched_setscheduler(r3, 0x5, &(0x7f0000000200)) ioctl$TIOCGPGRP(r2, 0x5415, &(0x7f0000000300)) r4 = memfd_create(&(0x7f00000000c0)='loeth1-\',securitywlan0+)\x00', 0x1) ioctl$RTC_PIE_OFF(r4, 0x7006) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000020a000000000000d70a3cd6c22b2af9740685691ce9ca7a00000000000001000000000000000000000000000000000000000000000000000000000000f2a33ccdfd844d3d0bcc000000000000df00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x90) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$TCFLSH(r2, 0x540b, 0x2) [ 1164.996621] kobject: 'loop3' (00000000d053dc44): kobject_uevent_env [ 1165.002714] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1165.013425] kobject: 'loop2' (00000000275c0945): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1165.023788] EXT4-fs (loop4): Invalid log block size: 150994944 [ 1165.041927] EXT4-fs (loop7): Invalid log block size: 4278190080 03:47:03 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) [ 1165.042014] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1165.051280] kobject: 'loop6' (00000000149961af): kobject_uevent_env [ 1165.056334] kobject: 'loop3' (00000000d053dc44): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1165.064026] kobject: 'loop6' (00000000149961af): fill_kobj_path: path = '/devices/virtual/block/loop6' 03:47:03 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x0, 0xfffffffffffff000]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:47:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x5, 0x480) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000000040)=0x200000, 0x4) [ 1165.097661] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1165.106709] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1165.110728] gfs2: not a GFS2 filesystem [ 1165.117408] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1165.124052] kobject: 'loop5' (000000009d5e043a): kobject_uevent_env [ 1165.124088] kobject: 'loop5' (000000009d5e043a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1165.133909] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1165.149654] kobject: 'loop0' (000000006545f760): kobject_uevent_env [ 1165.157664] kobject: 'loop5' (000000009d5e043a): kobject_uevent_env [ 1165.164513] kobject: 'loop0' (000000006545f760): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1165.168600] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1165.174942] kobject: 'loop5' (000000009d5e043a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1165.193346] kobject: 'loop3' (00000000d053dc44): kobject_uevent_env [ 1165.201439] kobject: 'loop1' (000000008801102d): kobject_uevent_env [ 1165.212896] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1165.225868] kobject: 'loop2' (00000000275c0945): kobject_uevent_env [ 1165.244269] kobject: 'loop3' (00000000d053dc44): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:47:03 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000000000500"}, &(0x7f0000000080)=0x1e) [ 1165.246927] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1165.254852] kobject: 'loop1' (000000008801102d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1165.277663] kobject: 'loop2' (00000000275c0945): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1165.282478] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1165.290264] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1165.313149] kobject: 'loop6' (00000000149961af): kobject_uevent_env [ 1165.320020] kobject: 'loop6' (00000000149961af): fill_kobj_path: path = '/devices/virtual/block/loop6' [ 1165.331148] kobject: 'loop0' (000000006545f760): kobject_uevent_env [ 1165.337849] kobject: 'loop0' (000000006545f760): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1165.361658] kobject: 'loop2' (00000000275c0945): kobject_uevent_env [ 1165.389843] kobject: 'loop2' (00000000275c0945): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1165.406061] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1165.440260] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1165.440342] kobject: 'loop1' (000000008801102d): kobject_uevent_env [ 1165.446855] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1165.463904] kobject: 'loop1' (000000008801102d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1165.464000] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1165.473848] kobject: 'loop5' (000000009d5e043a): kobject_uevent_env 03:47:04 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec0000000100087fffffffffffffff00002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:47:04 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x0, 0x3000000]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1165.499887] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1165.506348] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1165.516070] kobject: 'loop5' (000000009d5e043a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1165.522931] kobject: 'loop2' (00000000275c0945): kobject_uevent_env 03:47:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030040ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:47:04 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() set_thread_area(&(0x7f0000000000)={0x6, 0x20000800, 0xffffffffffffffff, 0x0, 0x4, 0x6, 0x5, 0x6, 0x80000000007, 0xfc}) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r2, 0x40087703, 0x8) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x7, 0x101000) getsockopt$sock_buf(r0, 0x1, 0x1f, &(0x7f0000000080)=""/72, &(0x7f0000000100)=0x48) 03:47:04 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000000000600"}, &(0x7f0000000080)=0x1e) 03:47:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000800003f000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1165.570222] kobject: 'loop2' (00000000275c0945): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1165.589551] kobject: 'loop3' (00000000d053dc44): kobject_uevent_env [ 1165.599425] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1165.599438] kobject: 'loop3' (00000000d053dc44): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:47:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1fffff, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:47:04 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x0, 0xa00]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:47:04 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900600001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1165.601261] kobject: 'loop1' (000000008801102d): kobject_uevent_env [ 1165.637080] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1165.645485] kobject: 'loop5' (000000009d5e043a): kobject_uevent_env [ 1165.646727] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1165.653979] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' 03:47:04 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() syz_open_procfs$namespace(r1, &(0x7f0000000080)='ns/user\x00') getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f00000000c0)=0x7, 0x4) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1165.665693] kobject: 'loop1' (000000008801102d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1165.689977] kobject: 'loop1' (000000008801102d): kobject_uevent_env [ 1165.693248] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1165.701069] kobject: 'loop1' (000000008801102d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1165.708937] kobject: 'loop6' (00000000149961af): kobject_uevent_env 03:47:04 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) [ 1165.715506] kobject: 'loop5' (000000009d5e043a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1165.722764] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1165.738273] kobject: 'loop6' (00000000149961af): fill_kobj_path: path = '/devices/virtual/block/loop6' [ 1165.756076] EXT4-fs (loop4): Invalid log block size: 16128 03:47:04 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x9}, 0x4) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x81}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000100)={r3, @in={{0x2, 0x4e22, @remote}}, [0x20, 0x7fffffff, 0x100000000, 0x0, 0x800000000, 0x8, 0x4, 0x0, 0x1f, 0x9, 0x3, 0x0, 0x1, 0x1, 0x5]}, &(0x7f0000000240)=0x100) sendfile(r0, r2, &(0x7f0000000280), 0x80) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000a0000000000000000000000000000000000ffffac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000900"], 0x90) [ 1165.775807] kobject: 'loop0' (000000006545f760): kobject_uevent_env [ 1165.786422] kobject: 'loop3' (00000000d053dc44): kobject_uevent_env [ 1165.787894] kobject: 'loop0' (000000006545f760): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1165.806225] EXT4-fs (loop7): Test dummy encryption mode enabled 03:47:04 executing program 2: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet6_buf(r0, 0x29, 0x83cf5842270a917f, &(0x7f0000000040)=""/46, &(0x7f0000000080)=0x2e) r1 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x101100, 0x0) ioctl$EVIOCGSND(r2, 0x8040451a, &(0x7f0000000100)=""/199) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000a0000000000000000000000000000000000ffffac1414aa0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x90) 03:47:04 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x0, 0x100000000000000]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1165.817100] kobject: 'loop3' (00000000d053dc44): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1165.832617] kobject: 'loop6' (00000000149961af): kobject_uevent_env [ 1165.839521] kobject: 'loop6' (00000000149961af): fill_kobj_path: path = '/devices/virtual/block/loop6' [ 1165.851727] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1165.865584] kobject: 'loop5' (000000009d5e043a): kobject_uevent_env 03:47:04 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) 03:47:04 executing program 2: r0 = socket$inet6(0xa, 0x800, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) [ 1165.872242] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1165.876146] EXT4-fs (loop7): Unsupported filesystem blocksize 0 (-1 log_block_size) [ 1165.884504] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1165.887333] gfs2: not a GFS2 filesystem [ 1165.898586] kobject: 'loop5' (000000009d5e043a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1165.900673] kobject: 'loop1' (000000008801102d): kobject_uevent_env [ 1165.926669] kobject: 'loop1' (000000008801102d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1165.931046] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1165.957077] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1165.979980] kobject: 'loop3' (00000000d053dc44): kobject_uevent_env [ 1165.986646] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1166.000002] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1166.004614] kobject: 'loop5' (000000009d5e043a): kobject_uevent_env [ 1166.016381] kobject: 'loop3' (00000000d053dc44): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1166.017771] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1166.030262] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1166.039992] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1166.073151] kobject: 'loop5' (000000009d5e043a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1166.073506] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1166.088295] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1166.092054] kobject: 'loop3' (00000000d053dc44): kobject_uevent_env [ 1166.113806] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1166.124466] kobject: 'loop3' (00000000d053dc44): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1166.125460] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1166.144613] kobject: 'loop0' (000000006545f760): kobject_uevent_env [ 1166.161555] kobject: 'loop0' (000000006545f760): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1166.173092] kobject: 'loop2' (00000000275c0945): kobject_uevent_env [ 1166.180232] kobject: 'loop1' (000000008801102d): kobject_uevent_env [ 1166.190066] kobject: 'loop1' (000000008801102d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1166.191917] kobject: 'loop2' (00000000275c0945): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1166.264695] kobject: 'loop6' (00000000149961af): kobject_uevent_env [ 1166.274168] kobject: 'loop6' (00000000149961af): fill_kobj_path: path = '/devices/virtual/block/loop6' [ 1166.293569] kobject: 'loop2' (00000000275c0945): kobject_uevent_env [ 1166.300678] kobject: 'loop1' (000000008801102d): kobject_uevent_env 03:47:05 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = dup2(r0, r0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000a0000000000000000000000000000000000ffffac1414aa0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000079af2ccf881cf6c9f21d45f77615257f8a6073000000000000000000000000000000"], 0x90) 03:47:05 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000000000000000500"}, &(0x7f0000000080)=0x1e) [ 1166.305562] kobject: 'loop2' (00000000275c0945): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1166.307128] kobject: 'loop1' (000000008801102d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1166.308217] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1166.316877] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1166.326428] kobject: 'loop5' (000000009d5e043a): kobject_uevent_env [ 1166.338233] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1166.358916] kobject: 'loop0' (000000006545f760): kobject_uevent_env [ 1166.365940] kobject: 'loop0' (000000006545f760): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1166.366210] kobject: 'loop5' (000000009d5e043a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1166.375951] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1166.402524] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1166.417823] kobject: 'loop6' (00000000149961af): kobject_uevent_env [ 1166.420023] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1166.434156] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1166.436170] kobject: 'loop6' (00000000149961af): fill_kobj_path: path = '/devices/virtual/block/loop6' [ 1166.471876] kobject: 'loop2' (00000000275c0945): kobject_uevent_env [ 1166.479181] kobject: 'loop2' (00000000275c0945): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1166.490843] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1166.497635] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1166.508856] kobject: 'loop6' (00000000149961af): kobject_uevent_env 03:47:05 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000902720001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:47:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000023000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:47:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c903003fec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:47:05 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000060000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1166.517742] kobject: 'loop6' (00000000149961af): fill_kobj_path: path = '/devices/virtual/block/loop6' [ 1166.539013] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1166.560603] kobject: 'loop1' (000000008801102d): kobject_uevent_env 03:47:05 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x1e240, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f0000000140)={@l2={0x1f, 0x9, {0x0, 0xa9d, 0x5, 0xc61c, 0x3, 0x7fffffff}, 0x1, 0x9}, {&(0x7f0000000040)=""/150, 0x96}, &(0x7f0000000100)}, 0xa0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:47:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2000000000000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:47:05 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x0, 0x300000000000000]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:47:05 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000000000300"}, &(0x7f0000000080)=0x1e) [ 1166.569558] kobject: 'loop1' (000000008801102d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1166.580822] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1166.587519] kobject: 'loop5' (000000009d5e043a): kobject_uevent_env [ 1166.597105] kobject: 'loop5' (000000009d5e043a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1166.602582] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1166.623631] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1166.645573] f2fs_msg: 46 callbacks suppressed [ 1166.645587] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1166.648029] kobject: 'loop0' (000000006545f760): kobject_uevent_env 03:47:05 executing program 2: r0 = socket$inet6(0xa, 0x800, 0x2009) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000956c475836b2493e5eaab9000000000a000000000000000000f6ffffffffffffffffffac1414aa0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008cc67be72f287338868500000000000000000000000000104000000000000000000000000000000000000000000000000000000000ecff0000000000000000000000000000000000000000"], 0x90) 03:47:05 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x0, 0xf0ffff]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:47:05 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) [ 1166.669274] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1166.679893] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1166.680768] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1166.708978] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1166.717574] kobject: 'loop0' (000000006545f760): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1166.727280] kobject: 'loop3' (00000000d053dc44): kobject_uevent_env [ 1166.734046] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1166.740676] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1166.742298] kobject: 'loop1' (000000008801102d): kobject_uevent_env [ 1166.760997] kobject: 'loop3' (00000000d053dc44): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1166.771380] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1166.782566] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1166.789196] EXT4-fs (loop7): Invalid log block size: 393216 [ 1166.796203] EXT4-fs (loop4): Invalid log block size: 8960 [ 1166.802986] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1166.817793] F2FS-fs (loop5): Invalid log blocks per segment (7471625) 03:47:05 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000000000000000400"}, &(0x7f0000000080)=0x1e) [ 1166.817793] [ 1166.826461] gfs2: not a GFS2 filesystem [ 1166.837402] kobject: 'loop1' (000000008801102d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1166.839479] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1166.854079] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1166.857939] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock 03:47:05 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x0, 0xf00]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1166.863611] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1166.872217] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1166.884027] kobject: 'loop3' (00000000d053dc44): kobject_uevent_env [ 1166.887717] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1166.892145] kobject: 'loop3' (00000000d053dc44): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1166.908517] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1166.909946] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1166.916216] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1166.935813] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1166.942763] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1166.946025] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1166.966563] EXT4-fs (loop7): Test dummy encryption mode enabled 03:47:05 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x10001, 0x101000) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000000c0)={@mcast1, 0x0}, &(0x7f0000000100)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x20, &(0x7f0000000440)={@multicast1, @multicast1, 0x0}, &(0x7f0000000480)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000940)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000c80)={@mcast2, 0x0}, &(0x7f0000000cc0)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000e40)={'erspan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000e80)={'veth1_to_bond\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000ec0)={{{@in=@local, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000fc0)=0xe8) recvmmsg(r0, &(0x7f0000005700)=[{{&(0x7f0000001000)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001080)=""/138, 0x8a}], 0x1, &(0x7f0000001180)=""/110, 0x6e, 0x2}, 0x4d}, {{&(0x7f0000001200), 0x80, &(0x7f00000016c0)=[{&(0x7f0000001280)=""/227, 0xe3}, {&(0x7f0000001380)=""/157, 0x9d}, {&(0x7f0000001440)=""/9, 0x9}, {&(0x7f0000001480)=""/119, 0x77}, {&(0x7f0000001500)=""/179, 0xb3}, {&(0x7f00000015c0)=""/231, 0xe7}], 0x6, &(0x7f00000018c0)=""/242, 0xf2, 0x1}, 0x8}, {{&(0x7f0000001740)=@ethernet, 0x80, &(0x7f0000002bc0)=[{&(0x7f00000019c0)=""/166, 0xa6}, {&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/7, 0x7}, {&(0x7f0000002a80)=""/43, 0x2b}, {&(0x7f0000002ac0)=""/109, 0x6d}, {&(0x7f0000002b40)=""/82, 0x52}], 0x6, 0x0, 0x0, 0x1}, 0x7}, {{&(0x7f0000002c40)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003f40)=[{&(0x7f0000002cc0)=""/73, 0x49}, {&(0x7f0000002d40)=""/161, 0xa1}, {&(0x7f0000002e00)=""/159, 0x9f}, {&(0x7f0000002ec0)=""/4096, 0x1000}, {&(0x7f0000003ec0)=""/116, 0x74}], 0x5, 0x0, 0x0, 0x100}, 0x9}, {{&(0x7f0000003fc0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, 0x80, &(0x7f0000005600)=[{&(0x7f0000004040)=""/4096, 0x1000}, {&(0x7f0000005040)=""/60, 0x3c}, {&(0x7f0000005080)=""/202, 0xca}, {&(0x7f0000005180)=""/192, 0xc0}, {&(0x7f0000005240)=""/250, 0xfa}, {&(0x7f0000005340)=""/249, 0xf9}, {&(0x7f0000005440)=""/194, 0xc2}, {&(0x7f0000005540)=""/170, 0xaa}], 0x8, &(0x7f0000005680)=""/117, 0x75, 0x1ff}, 0x9}], 0x5, 0x120, &(0x7f0000005840)={0x77359400}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000005880)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000005980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000006a00)={'vcan0\x00', 0x0}) accept4$packet(0xffffffffffffffff, &(0x7f0000006a40)={0x11, 0x0, 0x0}, &(0x7f0000006a80)=0x14, 0x80000) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000006ac0)={@empty, @local, 0x0}, &(0x7f0000006b00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006b40)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000006c40)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000006c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000006cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006d00)={'gre0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000006d40)={{{@in6=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000006e40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000006e80)={{{@in6=@mcast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000006f80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000006fc0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f00000070c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007100)={{{@in6=@mcast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000007200)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000007280)={0x0, @multicast2, @multicast2}, &(0x7f00000072c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000007300)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000007400)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007440)={{{@in=@multicast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000007540)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000075c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in=@multicast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000007700)=0xe8) recvmmsg(r0, &(0x7f000000b180)=[{{&(0x7f0000007800)=@hci, 0x80, &(0x7f0000007940)=[{&(0x7f0000007880)=""/10, 0xa}, {&(0x7f00000078c0)=""/86, 0x56}], 0x2, &(0x7f0000007980)=""/215, 0xd7, 0x10000}, 0xff}, {{0x0, 0x0, &(0x7f0000007b80)=[{&(0x7f0000007a80)=""/18, 0x12}, {&(0x7f0000007ac0)=""/181, 0xb5}], 0x2, &(0x7f0000007bc0)=""/175, 0xaf, 0x6}, 0x3}, {{0x0, 0x0, &(0x7f0000008ec0)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/195, 0xc3}, {&(0x7f0000008d80)=""/5, 0x5}, {&(0x7f0000008dc0)=""/26, 0x1a}, {&(0x7f0000008e00)=""/146, 0x92}], 0x5, &(0x7f0000008f40), 0x0, 0x5}, 0x8}, {{&(0x7f0000008f80)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000009080)=[{&(0x7f0000009000)=""/82, 0x52}], 0x1, &(0x7f00000090c0)=""/27, 0x1b, 0x8}, 0xa7}, {{&(0x7f0000009100)=@nfc, 0x80, &(0x7f0000009280)=[{&(0x7f0000009180)=""/105, 0x69}, {&(0x7f0000009200)=""/110, 0x6e}], 0x2, &(0x7f00000092c0)=""/235, 0xeb, 0x6}, 0x99}, {{&(0x7f00000093c0)=@pppol2tp, 0x80, &(0x7f000000a9c0)=[{&(0x7f0000009440)=""/209, 0xd1}, {&(0x7f0000009540)=""/178, 0xb2}, {&(0x7f0000009600)=""/199, 0xc7}, {&(0x7f0000009700)=""/4096, 0x1000}, {&(0x7f000000a700)=""/115, 0x73}, {&(0x7f000000a780)=""/237, 0xed}, {&(0x7f000000a880)=""/5, 0x5}, {&(0x7f000000a8c0)=""/103, 0x67}, {&(0x7f000000a940)=""/102, 0x66}], 0x9, &(0x7f000000aa80)=""/171, 0xab, 0x7fff}, 0x1ff}, {{&(0x7f000000ab40)=@rc, 0x80, &(0x7f000000ae40)=[{&(0x7f000000abc0)=""/69, 0x45}, {&(0x7f000000ac40)=""/215, 0xd7}, {&(0x7f000000ad40)=""/65, 0x41}, {&(0x7f000000adc0)=""/92, 0x5c}], 0x4, &(0x7f000000ae80)=""/114, 0x72, 0xff}, 0x10001}, {{0x0, 0x0, &(0x7f000000b080)=[{&(0x7f000000af00)=""/152, 0x98}, {&(0x7f000000afc0)=""/155, 0x9b}], 0x2, &(0x7f000000b0c0)=""/137, 0x89, 0x1}, 0x2}], 0x8, 0x100, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f000000b380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000b3c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000b400)={'team0\x00', 0x0}) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000010d00)={@empty, 0x0}, &(0x7f0000010d40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000012580)={{{@in=@multicast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000012680)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f00000126c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000012700)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000012740)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000012840)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000012880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000128c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000012fc0)={'vcan0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000013a40)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000013a00)={&(0x7f0000013000)={0x9d8, r3, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [{{0x8, 0x1, r4}, {0x3c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}]}}, {{0x8, 0x1, r6}, {0x264, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r9}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x69def567, 0xfffffffffffffffd, 0x8, 0x70}, {0x3, 0x5, 0x0, 0x100}]}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xece}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r10}}, {0x8}}}]}}, {{0x8, 0x1, r11}, {0x1f0, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r13}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r15}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r16}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r17}}}]}}, {{0x8, 0x1, r18}, {0x1dc, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x81}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r19}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r20}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r22}}}]}}, {{0x8, 0x1, r23}, {0xb4, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r24}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xf928}}}]}}, {{0x8, 0x1, r26}, {0x7c, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r27}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r28}}}]}}, {{0x8, 0x1, r29}, {0x3c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r30}}}]}}, {{0x8, 0x1, r31}, {0x12c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x100000000}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r32}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r33}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r34}}}]}}, {{0x8, 0x1, r35}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r36}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}]}}]}, 0x9d8}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:47:05 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000000000300"}, &(0x7f0000000080)=0x1e) [ 1166.972750] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1166.991575] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1167.003241] kobject: 'loop1' (000000008801102d): kobject_uevent_env 03:47:05 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x0, 0xfcea2a6146]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1167.026354] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1167.026892] kobject: 'loop1' (000000008801102d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1167.047714] F2FS-fs (loop5): Invalid log blocks per segment (7471625) [ 1167.047714] [ 1167.054108] EXT4-fs (loop7): Invalid log block size: 393216 [ 1167.068269] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1167.076183] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1167.084208] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock [ 1167.087805] kobject: 'loop2' (00000000275c0945): kobject_uevent_env [ 1167.100377] kobject: 'loop2' (00000000275c0945): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1167.110988] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1167.117981] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1167.140783] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1167.147245] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1167.162707] kobject: 'loop2' (00000000275c0945): kobject_uevent_env [ 1167.169486] EXT4-fs (loop4): Invalid log block size: 8960 [ 1167.177239] kobject: 'loop2' (00000000275c0945): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1167.184138] kobject: 'loop5' (000000009d5e043a): kobject_uevent_env [ 1167.188934] kobject: 'loop1' (000000008801102d): kobject_uevent_env [ 1167.201103] kobject: 'loop1' (000000008801102d): kobject_uevent_env [ 1167.210005] kobject: 'loop1' (000000008801102d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1167.219908] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1167.221476] kobject: 'loop5' (000000009d5e043a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1167.226355] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1167.240953] kobject: 'loop1' (000000008801102d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1167.285912] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1167.293255] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1167.305089] kobject: 'loop6' (00000000149961af): kobject_uevent_env [ 1167.312536] kobject: 'loop1' (000000008801102d): kobject_uevent_env [ 1167.319343] kobject: 'loop6' (00000000149961af): fill_kobj_path: path = '/devices/virtual/block/loop6' [ 1167.329485] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1167.332425] kobject: 'loop5' (000000009d5e043a): kobject_uevent_env [ 1167.336667] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1167.353892] kobject: 'loop1' (000000008801102d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1167.356252] kobject: 'loop5' (000000009d5e043a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1167.369421] kobject: 'loop1' (000000008801102d): kobject_uevent_env [ 1167.380688] kobject: 'loop1' (000000008801102d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1167.395513] kobject: 'loop0' (000000006545f760): kobject_uevent_env [ 1167.402549] kobject: 'loop0' (000000006545f760): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1167.412967] kobject: 'loop6' (00000000149961af): kobject_uevent_env [ 1167.419716] kobject: 'loop6' (00000000149961af): fill_kobj_path: path = '/devices/virtual/block/loop6' [ 1167.438883] kobject: 'loop6' (00000000149961af): kobject_uevent_env [ 1167.452938] kobject: 'loop6' (00000000149961af): fill_kobj_path: path = '/devices/virtual/block/loop6' [ 1167.469628] kobject: 'loop0' (000000006545f760): kobject_uevent_env [ 1167.477005] kobject: 'loop0' (000000006545f760): fill_kobj_path: path = '/devices/virtual/block/loop0' 03:47:06 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008002300000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1167.487609] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1167.494444] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1167.499856] kobject: 'loop1' (000000008801102d): kobject_uevent_env [ 1167.506187] kobject: 'loop3' (00000000d053dc44): kobject_uevent_env [ 1167.520206] kobject: 'loop3' (00000000d053dc44): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:47:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030800ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:47:06 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900060001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:47:06 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000000000000000100"}, &(0x7f0000000080)=0x1e) 03:47:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6c000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:47:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000800f6ffffff00000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:47:06 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x0, 0x200000000000000]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1167.530667] kobject: 'loop1' (000000008801102d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1167.550074] kobject: 'loop5' (000000009d5e043a): kobject_uevent_env [ 1167.558338] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env 03:47:06 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000000000000000300"}, &(0x7f0000000080)=0x1e) 03:47:06 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x0, 0xfffff000]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1167.586928] kobject: 'loop5' (000000009d5e043a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1167.589265] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1167.597029] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1167.603354] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1167.622515] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1167.629032] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1167.635143] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1167.638755] kobject: 'loop1' (000000008801102d): kobject_uevent_env [ 1167.648222] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1167.653492] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (-10 log_block_size) [ 1167.671722] kobject: 'loop1' (000000008801102d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1167.689423] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1167.704103] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1167.710880] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1167.718564] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1167.731424] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1167.733132] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1167.747478] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1167.747558] kobject: 'loop5' (000000009d5e043a): kobject_uevent_env [ 1167.755437] EXT4-fs (loop7): Invalid log block size: 35 [ 1167.762212] kobject: 'loop5' (000000009d5e043a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1167.783916] kobject: 'loop3' (00000000d053dc44): kobject_uevent_env [ 1167.791189] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1167.800087] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1167.800422] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1167.814472] kobject: 'loop0' (000000006545f760): kobject_uevent_env [ 1167.817956] kobject: 'loop3' (00000000d053dc44): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1167.827804] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:47:06 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x0, 0xffffff7f]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1167.839709] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1167.841446] kobject: 'loop0' (000000006545f760): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1167.858229] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1167.860050] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1167.877536] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1167.887824] gfs2: not a GFS2 filesystem [ 1167.893162] kobject: 'loop3' (00000000d053dc44): kobject_uevent_env [ 1167.899898] kobject: 'loop3' (00000000d053dc44): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1167.910659] kobject: 'loop1' (000000008801102d): kobject_uevent_env [ 1167.911018] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1167.924140] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1167.928996] kobject: 'loop1' (000000008801102d): fill_kobj_path: path = '/devices/virtual/block/loop1' 03:47:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008008cffffff00000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1167.930903] kobject: 'loop3' (00000000d053dc44): kobject_uevent_env [ 1167.965964] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1167.979902] kobject: 'loop3' (00000000d053dc44): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:47:06 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) [ 1167.993128] kobject: 'loop5' (000000009d5e043a): kobject_uevent_env [ 1167.993867] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1168.000598] kobject: 'loop6' (00000000149961af): kobject_uevent_env [ 1168.015974] kobject: 'loop5' (000000009d5e043a): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:47:06 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x0, 0x9effffff]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:47:06 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x6, {{0xa, 0x4e23, 0x2, @dev={0xfe, 0x80, [], 0xc}, 0x7ff}}, 0x0, 0x2, [{{0xa, 0x4e22, 0x401, @loopback, 0x1}}, {{0xa, 0x4e22, 0x9, @loopback, 0x4}}]}, 0x190) r1 = getpid() chroot(&(0x7f00000001c0)='./file0\x00') sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) r2 = dup(r0) write$P9_RSTAT(r2, &(0x7f0000000240)={0x45, 0x7d, 0x2, {0x0, 0x3e, 0x8, 0x3, {0x68, 0x4, 0x7}, 0x800000, 0x7fffffff, 0xc56, 0x0, 0x7, 'keyring', 0x4, 'proc'}}, 0x45) 03:47:06 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) 03:47:06 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001bfc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40, 0x0) connect$pptp(r2, &(0x7f0000000040)={0x18, 0x2, {0x0, @dev={0xac, 0x14, 0x14, 0xa}}}, 0x1e) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:47:06 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008002000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:47:06 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c00000009000000008f0000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:47:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x9000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1168.040097] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1168.043946] kobject: 'loop6' (00000000149961af): fill_kobj_path: path = '/devices/virtual/block/loop6' [ 1168.049197] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1168.069668] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1168.078876] kobject: 'loop5' (000000009d5e043a): kobject_uevent_env [ 1168.085309] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1168.085773] kobject: 'loop0' (000000006545f760): kobject_uevent_env [ 1168.125274] kobject: 'loop5' (000000009d5e043a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1168.165533] kobject: 'loop0' (000000006545f760): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1168.170519] kobject: 'loop1' (000000008801102d): kobject_uevent_env [ 1168.177872] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1168.198720] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1168.211847] kobject: 'loop1' (000000008801102d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1168.218832] kobject: 'loop6' (00000000149961af): kobject_uevent_env [ 1168.230182] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1168.234420] kobject: 'loop6' (00000000149961af): fill_kobj_path: path = '/devices/virtual/block/loop6' [ 1168.236621] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1168.282980] kobject: 'loop1' (000000008801102d): kobject_uevent_env [ 1168.290543] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1168.301112] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1168.312051] kobject: 'loop1' (000000008801102d): fill_kobj_path: path = '/devices/virtual/block/loop1' 03:47:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030400ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:47:07 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x0, 0xa]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:47:07 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) 03:47:07 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = fcntl$getown(r0, 0x9) ptrace$setregs(0xf, r1, 0x1, &(0x7f0000000080)="44ccca6f2b776eeec3784a7adf7b8ec4431e2562268e9f22013515ef77eaf1215a1669ae4321826a3336592543322ee7d4a1fc") r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000a0000d3a0f80cfbf3036b34c2de7e8c6560000000000000000000000000000000ffffac1414aa00000000000000000000000000000000000000000000000000000000000000000000510000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x90) [ 1168.342990] EXT4-fs (loop4): Unsupported filesystem blocksize 4194304 (-116 log_block_size) [ 1168.349005] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1168.358270] kobject: 'loop5' (000000009d5e043a): kobject_uevent_env [ 1168.362135] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1168.365819] kobject: 'loop5' (000000009d5e043a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1168.400286] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1168.404643] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1168.419994] kobject: 'loop1' (000000008801102d): kobject_uevent_env [ 1168.426460] kobject: 'loop1' (000000008801102d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1168.437756] kobject: 'loop3' (00000000d053dc44): kobject_uevent_env 03:47:07 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x0, 0x9effffff00000000]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1168.448120] kobject: 'loop1' (000000008801102d): kobject_uevent_env [ 1168.455338] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1168.469994] kobject: 'loop3' (00000000d053dc44): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1168.484880] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1168.490533] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:47:07 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:47:07 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) [ 1168.500790] kobject: 'loop1' (000000008801102d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1168.522417] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1168.530404] gfs2: not a GFS2 filesystem [ 1168.535664] kobject: 'loop0' (000000006545f760): kobject_uevent_env [ 1168.541971] kobject: 'loop5' (000000009d5e043a): kobject_uevent_env [ 1168.544547] kobject: 'loop0' (000000006545f760): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1168.548798] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1168.578816] kobject: 'loop5' (000000009d5e043a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1168.580751] kobject: 'loop3' (00000000d053dc44): kobject_uevent_env [ 1168.588936] EXT4-fs (loop7): Invalid log block size: 32 [ 1168.600120] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1168.625750] kobject: 'loop1' (000000008801102d): kobject_uevent_env [ 1168.634656] kobject: 'loop6' (00000000149961af): kobject_uevent_env 03:47:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000400000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:47:07 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x0, 0xf0ffffff00000000]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:47:07 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"69707673000000000000000000000000000000000000000000000000ff"}, &(0x7f0000000080)=0x1e) 03:47:07 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) accept$inet6(r0, 0x0, &(0x7f0000000000)) socket$l2tp(0x18, 0x1, 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) getpid() r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x1, 0x0) sendmsg$nl_crypto(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=@upd={0xe8, 0x12, 0x79af44c534374a04, 0x70bd29, 0x25dfdbfd, {{'xts(camellia)\x00'}, [], [], 0x400, 0x2000}, [{0x8, 0x1, 0xffffffffffffff00}]}, 0xe8}, 0x1, 0x0, 0x0, 0x40}, 0x4044051) openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x430801, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001800)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) 03:47:07 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x0, 0x46612aeafc000000]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:47:07 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) getxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00', &(0x7f0000000100)=""/2, 0x2) keyctl$unlink(0x9, 0x0, 0x0) [ 1168.644942] kobject: 'loop3' (00000000d053dc44): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1168.651139] kobject: 'loop1' (000000008801102d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1168.657312] kobject: 'loop6' (00000000149961af): fill_kobj_path: path = '/devices/virtual/block/loop6' [ 1168.679481] kobject: 'loop5' (000000009d5e043a): kobject_uevent_env [ 1168.687872] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1168.717009] kobject: 'loop5' (000000009d5e043a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1168.727251] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1168.729211] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1168.748441] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1168.759073] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1168.770288] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1168.777968] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1168.778397] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1168.791746] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1168.807440] kobject: 'loop5' (000000009d5e043a): kobject_uevent_env [ 1168.823501] kobject: 'loop5' (000000009d5e043a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1168.847328] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1168.854630] kobject: 'loop0' (000000006545f760): kobject_uevent_env [ 1168.870020] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1168.910135] kobject: 'loop1' (000000008801102d): kobject_uevent_env [ 1168.920461] kobject: 'loop0' (000000006545f760): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1168.922011] kobject: 'loop1' (000000008801102d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1168.940978] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1168.947697] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1168.955753] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1168.968151] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' 03:47:07 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000300000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:47:07 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) 03:47:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1168.995280] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1169.009449] kobject: 'loop1' (000000008801102d): kobject_uevent_env [ 1169.013159] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1169.030129] kobject: 'loop5' (000000009d5e043a): kobject_uevent_env [ 1169.032276] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1169.036572] kobject: 'loop5' (000000009d5e043a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1169.057255] kobject: 'loop1' (000000008801102d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1169.057972] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1169.070629] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1169.079990] kobject: 'loop3' (00000000d053dc44): kobject_uevent_env 03:47:07 executing program 2: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"62726964676530000000000000012200", 0xfffffffffffffffb}) 03:47:07 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x0, 0xf0ffffffffffff]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:47:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030700ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:47:07 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900000000200000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:47:07 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000000000000000500"}, &(0x7f0000000080)=0x1e) [ 1169.097719] EXT4-fs (loop4): bad block size 16384 [ 1169.098687] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1169.113234] kobject: 'loop3' (00000000d053dc44): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1169.124367] kobject: 'loop2' (00000000275c0945): kobject_uevent_env [ 1169.132360] kobject: 'loop2' (00000000275c0945): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1169.142287] gfs2: not a GFS2 filesystem 03:47:07 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) 03:47:08 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x0, 0xd4170000]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1169.160051] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1169.166693] bridge0: port 2(bridge_slave_1) entered disabled state [ 1169.173373] bridge0: port 1(bridge_slave_0) entered disabled state [ 1169.182872] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1169.186763] kobject: 'loop6' (00000000149961af): kobject_uevent_env [ 1169.196503] kobject: 'loop5' (000000009d5e043a): kobject_uevent_env [ 1169.211548] kobject: 'loop3' (00000000d053dc44): kobject_uevent_env [ 1169.215043] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1169.218236] kobject: 'loop1' (000000008801102d): kobject_uevent_env [ 1169.224538] kobject: 'loop6' (00000000149961af): fill_kobj_path: path = '/devices/virtual/block/loop6' [ 1169.238466] kobject: 'loop3' (00000000d053dc44): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1169.249233] bridge0: port 2(bridge_slave_1) entered blocking state [ 1169.255091] kobject: 'loop5' (000000009d5e043a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1169.256364] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1169.256524] bridge0: port 1(bridge_slave_0) entered blocking state [ 1169.266057] kobject: 'loop1' (000000008801102d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1169.272406] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1169.279854] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1169.300036] device bridge0 entered promiscuous mode [ 1169.316663] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1169.334492] kobject: 'loop3' (00000000d053dc44): kobject_uevent_env [ 1169.342846] bridge0: port 2(bridge_slave_1) entered disabled state [ 1169.343023] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1169.349335] bridge0: port 1(bridge_slave_0) entered disabled state [ 1169.366652] kobject: 'loop3' (00000000d053dc44): kobject_uevent_env [ 1169.369354] kobject: 'loop3' (00000000d053dc44): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1169.383753] kobject: 'loop3' (00000000d053dc44): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1169.400021] kobject: 'loop1' (000000008801102d): kobject_uevent_env [ 1169.407459] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1169.415247] kobject: 'loop5' (000000009d5e043a): kobject_uevent_env [ 1169.422699] kobject: 'loop1' (000000008801102d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1169.429459] kobject: 'loop5' (000000009d5e043a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1169.449603] device bridge0 left promiscuous mode [ 1169.453413] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' 03:47:08 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x0, 0x3f000000]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:47:08 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000000000500"}, &(0x7f0000000080)=0x1e) 03:47:08 executing program 2: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"62726964676530000000000000012200", 0xfffffffffffffffb}) 03:47:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000800c0ed000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1169.490495] kobject: 'loop1' (000000008801102d): kobject_uevent_env [ 1169.516540] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1169.523090] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1169.525663] kobject: 'loop5' (000000009d5e043a): kobject_uevent_env [ 1169.547335] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1169.556308] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1169.566452] kobject: 'loop5' (000000009d5e043a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1169.569873] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1169.578548] kobject: 'loop1' (000000008801102d): fill_kobj_path: path = '/devices/virtual/block/loop1' 03:47:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:47:08 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x0, 0xf0ffffff]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1169.594412] EXT4-fs (loop7): bad block size 8192 [ 1169.616158] bridge0: port 2(bridge_slave_1) entered blocking state [ 1169.622584] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1169.629283] bridge0: port 1(bridge_slave_0) entered blocking state [ 1169.635705] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1169.643669] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1169.653137] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1169.653374] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1169.676979] device bridge0 entered promiscuous mode [ 1169.682712] kobject: 'loop3' (00000000d053dc44): kobject_uevent_env [ 1169.691118] kobject: 'loop3' (00000000d053dc44): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1169.705423] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1169.715999] kobject: 'loop1' (000000008801102d): kobject_uevent_env [ 1169.722758] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1169.729428] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1169.740014] kobject: 'loop5' (000000009d5e043a): kobject_uevent_env [ 1169.742449] kobject: 'loop1' (000000008801102d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1169.747734] kobject: 'loop5' (000000009d5e043a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1169.778234] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1169.786629] kobject: 'loop0' (000000006545f760): kobject_uevent_env [ 1169.791950] kobject: 'loop3' (00000000d053dc44): kobject_uevent_env [ 1169.797061] kobject: 'loop0' (000000006545f760): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1169.810767] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1169.810810] kobject: 'loop3' (00000000d053dc44): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1169.833307] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1169.835296] kobject: 'loop2' (00000000275c0945): kobject_uevent_env [ 1169.840167] kobject: 'loop1' (000000008801102d): kobject_uevent_env [ 1169.846751] kobject: 'loop2' (00000000275c0945): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1169.859952] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1169.866093] kobject: 'loop6' (00000000149961af): kobject_uevent_env [ 1169.882601] kobject: 'loop6' (00000000149961af): fill_kobj_path: path = '/devices/virtual/block/loop6' [ 1169.891144] gfs2: not a GFS2 filesystem [ 1169.896155] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1169.899628] kobject: 'loop1' (000000008801102d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1169.905072] kobject: 'loop1' (000000008801102d): kobject_uevent_env [ 1169.919678] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1169.927453] kobject: 'loop1' (000000008801102d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1169.937219] EXT4-fs (loop4): Invalid log block size: 60864 [ 1169.944576] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1169.949904] kobject: 'loop3' (00000000d053dc44): kobject_uevent_env [ 1169.951271] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1169.957936] kobject: 'loop3' (00000000d053dc44): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1169.967917] kobject: 'loop3' (00000000d053dc44): kobject_uevent_env [ 1169.983173] kobject: 'loop3' (00000000d053dc44): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:47:08 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000800000000001fffff00002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:47:08 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) 03:47:08 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x0, 0xd417]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:47:08 executing program 2: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"62726964676530000000000000012200", 0xfffffffffffffffb}) 03:47:08 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c000000090021dd01000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) 03:47:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030600ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1169.993400] kobject: 'loop0' (000000006545f760): kobject_uevent_env [ 1170.000122] kobject: 'loop0' (000000006545f760): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1170.029797] bridge0: port 2(bridge_slave_1) entered disabled state [ 1170.036298] bridge0: port 1(bridge_slave_0) entered disabled state [ 1170.050186] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1170.056936] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1170.059878] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1170.071020] kobject: 'loop5' (000000009d5e043a): kobject_uevent_env [ 1170.079510] kobject: 'loop5' (000000009d5e043a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1170.086114] kobject: 'loop3' (00000000d053dc44): kobject_uevent_env 03:47:08 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) 03:47:08 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x0, 0x17d4]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1170.094178] kobject: 'loop6' (00000000149961af): kobject_uevent_env [ 1170.105572] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1170.112664] kobject: 'loop6' (00000000149961af): fill_kobj_path: path = '/devices/virtual/block/loop6' [ 1170.116517] kobject: 'loop1' (000000008801102d): kobject_uevent_env [ 1170.134781] device bridge0 left promiscuous mode [ 1170.142343] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1170.154676] kobject: 'loop3' (00000000d053dc44): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1170.162201] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1170.167518] kobject: 'loop1' (000000008801102d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1170.193592] kobject: 'loop2' (00000000275c0945): kobject_uevent_env [ 1170.200469] kobject: 'loop5' (000000009d5e043a): kobject_uevent_env [ 1170.218864] bridge0: port 2(bridge_slave_1) entered blocking state [ 1170.225409] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1170.232163] bridge0: port 1(bridge_slave_0) entered blocking state [ 1170.238550] bridge0: port 1(bridge_slave_0) entered forwarding state 03:47:08 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x0, 0x2]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1170.249094] kobject: 'loop2' (00000000275c0945): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1170.259413] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1170.259988] kobject: 'loop5' (000000009d5e043a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1170.282133] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1170.293069] kobject: 'loop0' (000000006545f760): kobject_uevent_env [ 1170.309695] kobject: 'loop1' (000000008801102d): kobject_uevent_env [ 1170.319663] kobject: 'loop0' (000000006545f760): fill_kobj_path: path = '/devices/virtual/block/loop0' 03:47:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfcfdffff00000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) [ 1170.352228] EXT4-fs (loop7): Test dummy encryption mode enabled [ 1170.372028] kobject: 'loop1' (000000008801102d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1170.375538] kobject: 'loop5' (000000009d5e043a): kobject_uevent_env [ 1170.394256] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env 03:47:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec00000001000800002d000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:47:09 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000000000000000100"}, &(0x7f0000000080)=0x1e) 03:47:09 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x0, 0x3]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) [ 1170.394290] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1170.401232] kobject: 'loop3' (00000000d053dc44): kobject_uevent_env [ 1170.419284] kobject: 'loop5' (000000009d5e043a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1170.429672] device bridge0 entered promiscuous mode [ 1170.432914] EXT4-fs (loop7): Invalid log cluster size: 16776991 [ 1170.440971] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1170.450949] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1170.460374] kobject: 'loop2' (00000000275c0945): kobject_uevent_env [ 1170.467407] kobject: 'loop3' (00000000d053dc44): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1170.480366] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1170.485664] kobject: 'loop2' (00000000275c0945): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:47:09 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900000301000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1170.514017] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1170.526711] kobject: 'loop6' (00000000149961af): kobject_uevent_env [ 1170.533264] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1170.534237] kobject: 'loop6' (00000000149961af): fill_kobj_path: path = '/devices/virtual/block/loop6' [ 1170.542524] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:47:09 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x0, 0xa00000000000000]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:47:09 executing program 2: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"62726964676530000000000000012200", 0xfffffffffffffffb}) [ 1170.555446] kobject: 'loop1' (000000008801102d): kobject_uevent_env [ 1170.559330] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1170.568181] kobject: 'loop5' (000000009d5e043a): kobject_uevent_env [ 1170.591824] kobject: 'loop5' (000000009d5e043a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1170.601736] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1170.631483] kobject: 'loop1' (000000008801102d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1170.650107] kobject: 'loop1' (000000008801102d): kobject_uevent_env [ 1170.688384] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1170.688652] kobject: 'loop2' (00000000275c0945): kobject_uevent_env [ 1170.694991] kobject: 'loop1' (000000008801102d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1170.711436] kobject: 'loop5' (000000009d5e043a): kobject_uevent_env [ 1170.718211] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1170.718793] kobject: 'loop3' (00000000d053dc44): kobject_uevent_env [ 1170.729525] kobject: 'loop5' (000000009d5e043a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1170.741616] bridge0: port 2(bridge_slave_1) entered disabled state [ 1170.748168] bridge0: port 1(bridge_slave_0) entered disabled state [ 1170.749619] kobject: 'loop2' (00000000275c0945): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1170.758097] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1170.773177] kobject: 'loop3' (00000000d053dc44): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:47:09 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"6970767300000000000000000000000000000000000000000000000600"}, &(0x7f0000000080)=0x1e) 03:47:09 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000070000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:47:09 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x0, 0xd417000000000000]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:47:09 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={"697076730000000000000000000000000000000000000000000300"}, &(0x7f0000000080)=0x1e) [ 1170.774737] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1170.794115] device bridge0 left promiscuous mode [ 1170.806002] kobject: 'loop1' (000000008801102d): kobject_uevent_env [ 1170.810831] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1170.813240] kobject: 'loop1' (000000008801102d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1170.821434] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1170.831356] bridge0: port 2(bridge_slave_1) entered blocking state [ 1170.844286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1170.850997] bridge0: port 1(bridge_slave_0) entered blocking state [ 1170.857370] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1170.861033] kobject: 'loop0' (000000006545f760): kobject_uevent_env [ 1170.871121] kobject: 'loop5' (000000009d5e043a): kobject_uevent_env [ 1170.877669] kobject: 'loop5' (000000009d5e043a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1170.882437] kobject: 'loop0' (000000006545f760): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1170.897675] gfs2: not a GFS2 filesystem [ 1170.898725] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1170.907855] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1170.922087] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1170.922654] kobject: 'loop6' (00000000149961af): kobject_uevent_env [ 1170.928171] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1170.928183] EXT4-fs (loop4): Invalid log block size: 11520 [ 1170.929384] device bridge0 entered promiscuous mode [ 1170.934984] kobject: 'loop3' (00000000d053dc44): kobject_uevent_env [ 1170.943914] EXT4-fs (loop1): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 1170.976779] kobject: 'loop3' (00000000d053dc44): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:47:09 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900002301000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)={[{@user_xattr='user_xattr'}]}) [ 1171.014086] kobject: 'loop6' (00000000149961af): fill_kobj_path: path = '/devices/virtual/block/loop6' [ 1171.024305] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1171.036896] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1171.039988] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1171.062298] kobject: 'loop0' (000000006545f760): kobject_uevent_env [ 1171.070346] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1171.076438] kobject: 'loop0' (000000006545f760): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1171.093503] kobject: 'loop2' (00000000275c0945): kobject_uevent_env [ 1171.108240] kobject: 'loop2' (00000000275c0945): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1171.124099] kobject: 'loop5' (000000009d5e043a): kobject_uevent_env [ 1171.130846] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1171.134174] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1171.144452] kobject: 'loop5' (000000009d5e043a): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:47:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="0001000000ff000000000000c9031004ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 03:47:09 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x0, 0xf00000000000000]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 03:47:09 executing program 2: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"62726964676530000000000000012200", 0xfffffffffffffffb}) 03:47:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7c0c000000000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{@barrier='barrier'}, {@hostdata={'hostdata', 0x3d, '!'}}]}) 03:47:09 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) [ 1171.168377] kobject: 'loop4' (00000000eac53f5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1171.171119] kobject: 'loop7' (00000000ce4b16e0): kobject_uevent_env [ 1171.188874] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1171.240418] kobject: 'loop1' (000000008801102d): kobject_uevent_env [ 1171.247736] kobject: 'loop4' (00000000eac53f5e): kobject_uevent_env [ 1171.259125] kobject: 'loop7' (00000000ce4b16e0): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1171.273611] kobject: 'loop1' (000000008801102d): fill_kobj_path: path = '/devices/virtual/block/loop1' 03:47:10 executing program 2: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"62726964676530000000000000012200", 0xfffffffffffffffb}) 03:47:10 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6=@empty={[0x0, 0xa000000]}, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8